9.8

CVE-2026-4203

Exploit

D-Link DNS-1550-04 network_mgr.cgi cgi_dhcpd command injection

A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Impacted is the function cgi_portforwarding_add/cgi_portforwarding_del/cgi_portforwarding_modify/cgi_portforwarding_add_scan/cgi_dhcpd_lease/cgi_ddns/cgi_ip/cgi_dhcpd of the file /cgi-bin/network_mgr.cgi. The manipulation results in command injection. The attack may be launched remotely. The exploit is now public and may be used.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DlinkDnr-202l Firmware Version <= 2026-02-05
   DlinkDnr-202l Version-
DlinkDnr-326 Firmware Version <= 2026-02-05
   DlinkDnr-326 Version-
DlinkDns-1100-4 Firmware Version <= 2026-02-05
   DlinkDns-1100-4 Version-
DlinkDns-120 Firmware Version <= 2026-02-05
   DlinkDns-120 Version-
DlinkDns-1200-05 Firmware Version <= 2026-02-05
   DlinkDns-1200-05 Version-
DlinkDns-1550-04 Firmware Version <= 2026-02-05
   DlinkDns-1550-04 Version-
DlinkDns-315l Firmware Version <= 2026-02-05
   DlinkDns-315l Version-
DlinkDns-320 Firmware Version <= 2026-02-05
   DlinkDns-320 Version-
DlinkDns-320l Firmware Version <= 2026-02-05
   DlinkDns-320l Version-
DlinkDns-320lw Firmware Version <= 2026-02-05
   DlinkDns-320lw Version-
DlinkDns-321 Firmware Version <= 2026-02-05
   DlinkDns-321 Version-
DlinkDns-322l Firmware Version <= 2026-02-05
   DlinkDns-322l Version-
DlinkDns-323 Firmware Version <= 2026-02-05
   DlinkDns-323 Version-
DlinkDns-325 Firmware Version <= 2026-02-05
   DlinkDns-325 Version-
DlinkDns-326 Firmware Version <= 2026-02-05
   DlinkDns-326 Version-
DlinkDns-327l Firmware Version <= 2026-02-05
   DlinkDns-327l Version-
DlinkDns-340l Firmware Version <= 2026-02-05
   DlinkDns-340l Version-
DlinkDns-343 Firmware Version <= 2026-02-05
   DlinkDns-343 Version-
DlinkDns-345 Firmware Version <= 2026-02-05
   DlinkDns-345 Version-
DlinkDns-726-4 Firmware Version <= 2026-02-05
   DlinkDns-726-4 Version-
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.1% 0.279
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cna@vuldb.com 2.1 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
cna@vuldb.com 6.3 2.8 3.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cna@vuldb.com 6.5 8 6.4
AV:N/AC:L/Au:S/C:P/I:P/A:P
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

https://vuldb.com/?id.351115
Third Party Advisory
VDB Entry
https://vuldb.com/?ctiid.351115
VDB Entry
Permissions Required
https://vuldb.com/?submit.770401
Third Party Advisory
VDB Entry
https://vuldb.com/?submit.770402
Third Party Advisory
VDB Entry
https://vuldb.com/?submit.770403
Third Party Advisory
VDB Entry
https://vuldb.com/?submit.770404
Third Party Advisory
VDB Entry
https://vuldb.com/?submit.770405
Third Party Advisory
VDB Entry
https://vuldb.com/?submit.770406
Third Party Advisory
VDB Entry
https://vuldb.com/?submit.770407
Third Party Advisory
VDB Entry
https://vuldb.com/?submit.770408
Third Party Advisory
VDB Entry