Description
A vulnerability was found in D-Link DCS-931L up to 1.13.0. Impacted is the function doSystem of the file /setSystemAdmin. Performing a manipulation of the argument AdminID results in command injection. The attack may be initiated remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-02-09
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Workaround
AI Analysis

Impact

A vulnerability exists in D‑Link DCS‑931L firmware up to version 1.13.0, where an attacker can manipulate the AdminID parameter of the /setSystemAdmin endpoint, triggering arbitrary operating‑system command execution. The flaw is a classic command injection (CWE‑74, CWE‑77). Exploitation can give the attacker control over the device, including full firmware‑level privileges.

Affected Systems

The affected product is the D‑Link DCS‑931L network video recorder, running firmware 1.13.0 or earlier. Firmware is no longer supported, so no official fix is available from the vendor.

Risk and Exploitability

The exploit can be launched remotely without authentication. Although the CVSS score is 5.1, indicating moderate severity, the lack of a public patch and the public availability of proof‑of‑concept code increase the risk of real‑world attacks. The EPSS score is below 1 % and the vulnerability is not in CISA KEV, but the low defense is the lack of vendor assistance, making mitigation the primary defense.

Generated by OpenCVE AI on April 18, 2026 at 13:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Disable remote management or configure the device to allow /setSystemAdmin only from trusted networks, using ACLs or VLAN segmentation.
  • Block outbound traffic from the device to prevent it from being used as a foothold for further attacks, and monitor logs for suspicious command execution attempts.
  • If possible, migrate to a supported router or replace the device with a vendor that still provides updates to mitigate long‑term risk.

Generated by OpenCVE AI on April 18, 2026 at 13:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
References

Tue, 10 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dcs-931l
Dlink dcs-931l Firmware
CPEs cpe:2.3:h:dlink:dcs-931l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dcs-931l_firmware:*:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dcs-931l
Dlink dcs-931l Firmware

Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dcs-931l
Vendors & Products D-link
D-link dcs-931l

Mon, 09 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in D-Link DCS-931L up to 1.13.0. Impacted is the function doSystem of the file /setSystemAdmin. Performing a manipulation of the argument AdminID results in command injection. The attack may be initiated remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title D-Link DCS-931L setSystemAdmin doSystem command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dcs-931l
Dlink Dcs-931l Dcs-931l Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:59:48.888Z

Reserved: 2026-02-08T16:12:11.558Z

Link: CVE-2026-2227

cve-icon Vulnrichment

Updated: 2026-02-09T13:52:01.299Z

cve-icon NVD

Status : Modified

Published: 2026-02-09T10:15:57.880

Modified: 2026-02-23T11:16:25.757

Link: CVE-2026-2227

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:15:25Z

Weaknesses