Impact
The vulnerability allows the injection of arbitrary shell commands through the remote_backup.cgi script, specifically when the cgi_set_rsync_server function is invoked. This command injection can be performed over the network, granting an attacker the ability to run any command with the privileges of the web server process. The implications include full compromise of the device, unauthorized data exfiltration, manipulation of configuration settings, and potential use as a foothold for further network attacks. The weakness is identified as CWE-74 and CWE-77.
Affected Systems
Affected products include D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326 (duplicate), DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05, and DNS-1550-04, for all firmware releases up to 20260205. Users should verify if their device is running one of these models with a firmware build dated before or on this date and apply updates accordingly.
Risk and Exploitability
The CVSS score is 5.3, indicating a moderate severity. EPSS is below 1%, suggesting that public exploitation is currently unlikely, and the vulnerability is not listed in CISA's KEV catalog. The attack can be executed from a remote network location by sending specially crafted HTTP requests to /cgi-bin/remote_backup.cgi. No special local privileges are required, so any external user who can reach the device can potentially exploit this flaw.
OpenCVE Enrichment