← Volver a CVEs
CVE-2026-4207
MEDIUM6.3
Descripcion
A vulnerability was determined in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This impacts the function cgi_device/cgi_sms_test/cgi_firmware_upload/cgi_ntp_time of the file /cgi-bin/system_mgr.cgi. Executing a manipulation can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Detalles CVE
Puntuacion CVSS v3.16.3
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado3/16/2026
Ultima modificacion3/19/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
dlink:dnr-202ldlink:dnr-202l_firmwaredlink:dnr-326dlink:dnr-326_firmwaredlink:dns-1100-4dlink:dns-1100-4_firmwaredlink:dns-120dlink:dns-1200-05dlink:dns-1200-05_firmwaredlink:dns-120_firmwaredlink:dns-1550-04dlink:dns-1550-04_firmwaredlink:dns-315ldlink:dns-315l_firmwaredlink:dns-320dlink:dns-320_firmwaredlink:dns-320ldlink:dns-320l_firmwaredlink:dns-320lwdlink:dns-320lw_firmwaredlink:dns-321dlink:dns-321_firmwaredlink:dns-322ldlink:dns-322l_firmwaredlink:dns-323dlink:dns-323_firmwaredlink:dns-325dlink:dns-325_firmwaredlink:dns-326dlink:dns-326_firmwaredlink:dns-327ldlink:dns-327l_firmwaredlink:dns-340ldlink:dns-340l_firmwaredlink:dns-343dlink:dns-343_firmwaredlink:dns-345dlink:dns-345_firmwaredlink:dns-726-4dlink:dns-726-4_firmware
Debilidades (CWE)
CWE-74CWE-77CWE-77
Referencias
https://vuldb.com/?ctiid.351119(cna@vuldb.com)
https://vuldb.com/?id.351119(cna@vuldb.com)
https://vuldb.com/?submit.770420(cna@vuldb.com)
https://vuldb.com/?submit.770422(cna@vuldb.com)
https://vuldb.com/?submit.770423(cna@vuldb.com)
https://vuldb.com/?submit.770425(cna@vuldb.com)
https://www.dlink.com/(cna@vuldb.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.