Description
A flaw has been found in D-Link DI-7100G C1 24.04.18D1. This affects the function start_proxy_client_email. Executing a manipulation can lead to command injection. The attack can be executed remotely. The exploit has been published and may be used.
Published: 2026-02-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

A firmware flaw in the D-Link DI-7100G C1 router allows attackers to inject arbitrary shell commands via the start_proxy_client_email function. This command injection can be triggered remotely, enabling an attacker to run malicious commands on the device and potentially compromise its integrity and confidentiality.

Affected Systems

The vulnerability affects the D-Link DI-7100G C1 model running firmware version 24.04.18D1. Only this specific firmware revision is confirmed to be vulnerable; newer or older firmware may not be impacted.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog, but published exploits exist, implying that determined adversaries could target affected devices. The attack vector is inferred to be remote, likely over the network, as the function is accessible remotely and the description states the attack can be executed remotely.

Generated by OpenCVE AI on April 17, 2026 at 21:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an updated firmware version from D-Link that patches the start_proxy_client_email command injection flaw.
  • If an update is unavailable, configure network or firewall rules to block remote access to the device’s management interface or specifically the endpoint that triggers start_proxy_client_email.
  • Once the mitigation is in place, continuously monitor device logs for suspicious command execution attempts or abnormal traffic patterns related to the vulnerable function.

Generated by OpenCVE AI on April 17, 2026 at 21:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink di-7100g C1
Dlink di-7100g C1 Firmware
CPEs cpe:2.3:h:dlink:di-7100g_c1:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:di-7100g_c1_firmware:24.04.18d1:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink di-7100g C1
Dlink di-7100g C1 Firmware

Mon, 09 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link di-7100g C1
Vendors & Products D-link
D-link di-7100g C1

Mon, 09 Feb 2026 00:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in D-Link DI-7100G C1 24.04.18D1. This affects the function start_proxy_client_email. Executing a manipulation can lead to command injection. The attack can be executed remotely. The exploit has been published and may be used.
Title D-Link DI-7100G C1 start_proxy_client_email command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Di-7100g C1
Dlink Di-7100g C1 Di-7100g C1 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:51:36.490Z

Reserved: 2026-02-07T17:32:56.263Z

Link: CVE-2026-2194

cve-icon Vulnrichment

Updated: 2026-02-09T20:39:53.890Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T00:15:48.840

Modified: 2026-02-11T18:36:51.667

Link: CVE-2026-2194

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:45:28Z

Weaknesses