PT-2026-25589 · D Link · Dnr-202L+18

Pjqwudi

·

Published

2026-03-16

·

Updated

2026-03-16

·

CVE-2026-4209

CVSS v2.0
6.5
VectorAV:N/AC:L/Au:S/C:P/I:P/A:P
A vulnerability was identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected is the function cgi create import users/cgi user batch create/cgi user set quota/cgi user del/cgi user modify/cgi group set quota/cgi group modify/cgi group add/cgi user add/cgi get modify group info/cgi chg admin pw of the file /cgi-bin/account mgr.cgi. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

Exploit

Fix

Command Injection

Special Elements Injection

Weakness Enumeration

Related Identifiers

CVE-2026-4209

Affected Products

Dnr-202L
Dnr-322L
Dnr-326
Dns-1100-4
Dns-120
Dns-1200-05
Dns-1550-04
Dns-315L
Dns-320
Dns-320L
Dns-321
Dns-323
Dns-325
Dns-326
Dns-327L
Dns-340L
Dns-343
Dns-345
Dns-726-4