CVE-2026-4529
D-Link · DHP-1320
A critical security vulnerability has been identified in the D-Link DHP-1320 router. This flaw may allow for remote exploitation and unauthorized device control.
Executive summary
A high-severity vulnerability in the D-Link DHP-1320 powerline router could allow attackers to compromise the device and intercept network traffic.
Vulnerability
A vulnerability exists within the D-Link DHP-1320 hardware/firmware stack. Given the CVSS score of 8.8, this flaw likely involves a remote, unauthenticated attack vector targeting the device's management interface or network services.
Business impact
Compromise of a network gateway like the DHP-1320 allows an attacker to perform man-in-the-middle (MitM) attacks, pivot to other devices on the internal network, and disrupt internet connectivity. The CVSS score of 8.8 justifies a high-priority response, as the vulnerability poses a direct threat to the confidentiality and integrity of all data passing through the affected hardware.
Remediation
Immediate Action: Update the D-Link DHP-1320 firmware to the latest available version immediately; if the device is end-of-life (EoL), replace it with a supported model.
Proactive Monitoring: Review network traffic for anomalous outbound connections originating from the router and monitor for unauthorized changes to DNS settings.
Compensating Controls: Ensure the router’s management interface is not accessible from the Wide Area Network (WAN) and use strong, unique administrative passwords.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability carries a high severity rating and affects critical networking infrastructure. It is imperative that administrators verify the firmware status of all DHP-1320 units and apply updates or decommission vulnerable hardware to prevent network-wide compromise.