Impact
A vulnerability exists in the Get_current_raidtype function of /cgi-bin/dsk_mgr.cgi, allowing attackers to manipulate the request and bypass the intended access controls. The flaw may expose sensitive status or configuration information to unauthenticated users. The description indicates that the attack can be launched remotely and a public exploit is available.
Affected Systems
The flaw affects a wide range of D-Link devices, including DNS‑120, DNS‑1550‑04, DNS‑326, DNS‑326, DNS‑320L, DNS‑320LW, DNS‑321, DNS‑323, DNS‑325, DNS‑326, DNS‑327L, DNS‑340L, DNS‑343, DNS‑345, DNS‑726‑4, DNS‑1100‑4, DNS‑1200‑05, DNS‑315L, DNS‑320, DNS‑320L, DNS‑320LW and other listed models. Firmware versions up to 20260205 are impacted.
Risk and Exploitability
The CVSS score of 6.9 signifies a moderate severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability can be triggered remotely without the need for local access, and publicly available exploit code indicates that no privileged credentials are required. It is not currently listed in the CISA Known Exploited Vulnerabilities catalog, meaning no confirmed large‑scale attacks have been reported.
OpenCVE Enrichment