CVE-2026-8273
D-Link DNS-320 system_mgr.cgi cgi_merge_user os command injection
CVSS Score
4.7
EPSS Score
0.2%
EPSS Percentile
47th
A weakness has been identified in D-Link DNS-320 2.06B01. This impacts the function cgi_set_host/cgi_set_ntp/cgi_fan_control/cgi_merge_user of the file /cgi-bin/system_mgr.cgi. This manipulation causes os command injection. It is possible to initiate the attack remotely.
| CWE | CWE-78 CWE-77 |
| Vendor | d-link |
| Product | dns-320 |
| Published | May 11, 2026 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for d-link dns-320
Be the first to know when new medium vulnerabilities affecting d-link dns-320 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
D-Link / DNS-320
2.06B01
References
vuldb.com: https://vuldb.com/vuln/362570 vuldb.com: https://vuldb.com/vuln/362570/cti vuldb.com: https://vuldb.com/submit/810082 github.com: https://github.com/dxz0069/WAVLINK-WN530H4-Command-Injection-in-set_add_routing/blob/main/D-Link%20DNS-320%20%20system_mgraccount_mgrdsk_mgrapp_mgr%20Multiple%20CGI%20OS%20Command%20Injection.md dlink.com: https://www.dlink.com/
Credits
๐ ST4R (VulDB User)