Impact
The vulnerability is a command injection flaw in the /cgi-bin/network_mgr.cgi cgi_dhcpd function on several D-Link routers. Exploitation allows an attacker to insert arbitrary operating system commands via the web interface, which may result in unauthorized configuration changes, network disruption, or further malicious activity. Based on the nature of command injection, it is inferred that an attacker could gain the privileges of the web server process and potentially control the device. The weakness aligns with CWE-74 (URL Manipulation) and CWE-77 (Command Injection).
Affected Systems
Affected products include D-Link DNR-202L, DNR-326, DNR-322L, DNS-1100-4, DNS-120, DNS-1200-05, DNS-1550-04, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNS-323, DNS-325, DNS-326, DNS-327L, DNS-340L, DNS-343, DNS-345, and DNS-726-4. Firmware versions up to and including build 20260205 contain the vulnerability; no later firmware versions are listed as affected.
Risk and Exploitability
The CVSS v3.1 base score of 5.3 indicates moderate severity. EPSS is below 1 %, suggesting a low likelihood of current exploitation. The vulnerability is not in the CISA KEV catalog. The text states that the attack may be launched remotely, implying that an external user who can reach the web interface could trigger the injection. Successful exploitation would compromise the confidentiality, integrity, and availability of the router and connected networks.
OpenCVE Enrichment