Description
A vulnerability was identified in D-Link DNS-320 2.06B01. The impacted element is the function cgi_speed/cgi_dhcpd_lease/cgi_ddns/cgi_set_ip/cgi_upnp_del/cgi_dhcpd/cgi_upnp_add/cgi_upnp_edit of the file /cgi-bin/network_mgr.cgi. The manipulation leads to os command injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
Published: 2026-05-11
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability allows an attacker to inject arbitrary operating‑system commands through the cgi_upnp_edit function in /cgi-bin/network_mgr.cgi. Successful exploitation results in remote code execution on the D‑Link DNS‑320 device, enabling the attacker to read, modify, or delete data, install malware, or take complete control of the device. The weakness is classified as OWASP CWE‑77 and CWE‑78, reflecting classic command‑injection and operating‑system command execution flaws. This could compromise the confidentiality, integrity, and availability of the device and any network services it hosts.

Affected Systems

D‑Link DNS‑320 routers running firmware version 2.06B01 are affected. The issue resides in several CGI handlers—including cgi_speed, cgi_dhcpd_lease, cgi_ddns, cgi_set_ip, cgi_upnp_del, cgi_dhcpd, cgi_upnp_add, and cgi_upnp_edit—within the network_mgr.cgi script accessed via the router’s web interface.

Risk and Exploitability

The flaw is reachable over the network; an attacker can invoke it remotely by sending specially crafted HTTP requests to the vulnerable CGI scripts. While the publicly documented exploits are available, the CVSS score of 5.1 indicates moderate severity, and no EPSS score suggests limited exploitation probability so far. The vulnerability is not listed in the CISA KEV catalog, but because it permits unrestricted command execution on a home‑network router, it remains a significant risk for systems where management access is exposed to untrusted networks.

Generated by OpenCVE AI on May 11, 2026 at 06:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the DNS‑320 firmware to a version that removes the vulnerable CGI code.
  • Disable UPnP functionality in the router’s configuration if it is not required.
  • Restrict web‑management access to the router by limiting it to trusted IP addresses or a private VLAN.

Generated by OpenCVE AI on May 11, 2026 at 06:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dns-320
Dlink dns-320 Firmware
CPEs cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-320_firmware:2.06b01:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dns-320
Dlink dns-320 Firmware

Mon, 11 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 11 May 2026 06:45:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dns-320
Vendors & Products D-link
D-link dns-320

Mon, 11 May 2026 05:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in D-Link DNS-320 2.06B01. The impacted element is the function cgi_speed/cgi_dhcpd_lease/cgi_ddns/cgi_set_ip/cgi_upnp_del/cgi_dhcpd/cgi_upnp_add/cgi_upnp_edit of the file /cgi-bin/network_mgr.cgi. The manipulation leads to os command injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
Title D-Link DNS-320 network_mgr.cgi cgi_upnp_edit os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

D-link Dns-320
Dlink Dns-320 Dns-320 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-11T10:19:22.797Z

Reserved: 2026-05-10T15:53:48.161Z

Link: CVE-2026-8271

cve-icon Vulnrichment

Updated: 2026-05-11T10:19:04.265Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-11T05:16:16.093

Modified: 2026-05-11T20:33:29.837

Link: CVE-2026-8271

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T06:30:29Z

Weaknesses