PT-2026-25589 · D Link · Dnr-202L+18
Pjqwudi
·
Published
2026-03-16
·
Updated
2026-03-16
·
CVE-2026-4209
CVSS v2.0
6.5
| Vector | AV:N/AC:L/Au:S/C:P/I:P/A:P |
A vulnerability was identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected is the function cgi create import users/cgi user batch create/cgi user set quota/cgi user del/cgi user modify/cgi group set quota/cgi group modify/cgi group add/cgi user add/cgi get modify group info/cgi chg admin pw of the file /cgi-bin/account mgr.cgi. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Exploit
Fix
Command Injection
Special Elements Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Dnr-202L
Dnr-322L
Dnr-326
Dns-1100-4
Dns-120
Dns-1200-05
Dns-1550-04
Dns-315L
Dns-320
Dns-320L
Dns-321
Dns-323
Dns-325
Dns-326
Dns-327L
Dns-340L
Dns-343
Dns-345
Dns-726-4