D-Link DHP-1320 1.00WWB04 SOAP Handler Stack Buffer Overflow Remote Exploit
CVE-2026-4529 Published on March 21, 2026
D-Link DHP-1320 SOAP redirect_count_down_page stack-based overflow
A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.
Timeline
Advisory disclosed
VulDB entry created
VulDB entry last update
Weakness Types
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2026-4529 has been classified to as a Stack Overflow vulnerability or weakness.
What is a Buffer Overflow Vulnerability?
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
CVE-2026-4529 has been classified to as a Buffer Overflow vulnerability or weakness.
Affected Versions
D-Link DHP-1320 Version 1.00WWB04 is affected by CVE-2026-4529Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.