Impact
The flaw resides in the cgi_tm_set_share function within /cgi-bin/time_machine.cgi. By supplying a crafted Name parameter, attackers can inject shell commands that are executed with the privileges of the web service, enabling remote code execution on the device. This allows full control or destruction of network configuration and aligns with CWE‑77 (Command Injection) and CWE‑74 (Improper Neutralization of Path Elements).
Affected Systems
Affected devices include a range of D‑Link routers and DNS appliances: D-Link DNR‑202L, DNR‑326, DNS‑1100‑4, DNS‑120, DNS‑1200‑05, DNS‑1550‑04, DNS‑315L, DNS‑320, DNS‑320L, DNS‑320LW, DNS‑321, DNS‑322L, DNS‑323, DNS‑325, DNS‑326, DNS‑327L, DNS‑340L, DNS‑343, DNS‑345, DNS‑726‑4. The issue is present in firmware versions up to 20260205; newer versions beyond that date are considered fixed.
Risk and Exploitability
CVSS base score of 5.3 indicates moderate severity, while the EPSS score is below 1 % suggesting a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it remotely by sending a crafted HTTP request to the time_machine.cgi endpoint from any machine that can reach the device’s management interface, without requiring local privileges.
OpenCVE Enrichment