CVE-2026-4529

D-Link · DHP-1320

A critical security vulnerability has been identified in the D-Link DHP-1320 router. This flaw may allow for remote exploitation and unauthorized device control.

Executive summary

A high-severity vulnerability in the D-Link DHP-1320 powerline router could allow attackers to compromise the device and intercept network traffic.

Vulnerability

A vulnerability exists within the D-Link DHP-1320 hardware/firmware stack. Given the CVSS score of 8.8, this flaw likely involves a remote, unauthenticated attack vector targeting the device's management interface or network services.

Business impact

Compromise of a network gateway like the DHP-1320 allows an attacker to perform man-in-the-middle (MitM) attacks, pivot to other devices on the internal network, and disrupt internet connectivity. The CVSS score of 8.8 justifies a high-priority response, as the vulnerability poses a direct threat to the confidentiality and integrity of all data passing through the affected hardware.

Remediation

Immediate Action: Update the D-Link DHP-1320 firmware to the latest available version immediately; if the device is end-of-life (EoL), replace it with a supported model.

Proactive Monitoring: Review network traffic for anomalous outbound connections originating from the router and monitor for unauthorized changes to DNS settings.

Compensating Controls: Ensure the router’s management interface is not accessible from the Wide Area Network (WAN) and use strong, unique administrative passwords.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability carries a high severity rating and affects critical networking infrastructure. It is imperative that administrators verify the firmware status of all DHP-1320 units and apply updates or decommission vulnerable hardware to prevent network-wide compromise.