← Back to CVEs
CVE-2026-4207
MEDIUM6.3
Description
A vulnerability was determined in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This impacts the function cgi_device/cgi_sms_test/cgi_firmware_upload/cgi_ntp_time of the file /cgi-bin/system_mgr.cgi. Executing a manipulation can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
CVE Details
CVSS v3.1 Score6.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published3/16/2026
Last Modified3/19/2026
Sourcenvd
Honeypot Sightings0
Affected Products
dlink:dnr-202ldlink:dnr-202l_firmwaredlink:dnr-326dlink:dnr-326_firmwaredlink:dns-1100-4dlink:dns-1100-4_firmwaredlink:dns-120dlink:dns-1200-05dlink:dns-1200-05_firmwaredlink:dns-120_firmwaredlink:dns-1550-04dlink:dns-1550-04_firmwaredlink:dns-315ldlink:dns-315l_firmwaredlink:dns-320dlink:dns-320_firmwaredlink:dns-320ldlink:dns-320l_firmwaredlink:dns-320lwdlink:dns-320lw_firmwaredlink:dns-321dlink:dns-321_firmwaredlink:dns-322ldlink:dns-322l_firmwaredlink:dns-323dlink:dns-323_firmwaredlink:dns-325dlink:dns-325_firmwaredlink:dns-326dlink:dns-326_firmwaredlink:dns-327ldlink:dns-327l_firmwaredlink:dns-340ldlink:dns-340l_firmwaredlink:dns-343dlink:dns-343_firmwaredlink:dns-345dlink:dns-345_firmwaredlink:dns-726-4dlink:dns-726-4_firmware
Weaknesses (CWE)
CWE-74CWE-77CWE-77
References
https://vuldb.com/?ctiid.351119(cna@vuldb.com)
https://vuldb.com/?id.351119(cna@vuldb.com)
https://vuldb.com/?submit.770420(cna@vuldb.com)
https://vuldb.com/?submit.770422(cna@vuldb.com)
https://vuldb.com/?submit.770423(cna@vuldb.com)
https://vuldb.com/?submit.770425(cna@vuldb.com)
https://www.dlink.com/(cna@vuldb.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.