๐Ÿ” CVE Alert

CVE-2026-8271

MEDIUM 4.7

D-Link DNS-320 network_mgr.cgi cgi_upnp_edit os command injection

CVSS Score
4.7
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was identified in D-Link DNS-320 2.06B01. The impacted element is the function cgi_speed/cgi_dhcpd_lease/cgi_ddns/cgi_set_ip/cgi_upnp_del/cgi_dhcpd/cgi_upnp_add/cgi_upnp_edit of the file /cgi-bin/network_mgr.cgi. The manipulation leads to os command injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

CWE CWE-78 CWE-77
Vendor d-link
Product dns-320
Published May 11, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for d-link dns-320

Be the first to know when new medium vulnerabilities affecting d-link dns-320 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

D-Link / DNS-320
2.06B01

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/362568 vuldb.com: https://vuldb.com/vuln/362568/cti vuldb.com: https://vuldb.com/submit/810078 github.com: https://github.com/dxz0069/WAVLINK-WN530H4-Command-Injection-in-set_add_routing/blob/main/D-Link%20DNS-320%20network_mgr.cgi%20Multiple%20OS%20Command%20Injection%20Vulnerabilities.md dlink.com: https://www.dlink.com/

Credits

๐Ÿ” ST4R (VulDB User)