Description
A weakness has been identified in D-Link DNS-320 2.06B01. This impacts the function cgi_set_host/cgi_set_ntp/cgi_fan_control/cgi_merge_user of the file /cgi-bin/system_mgr.cgi. This manipulation causes os command injection. It is possible to initiate the attack remotely.
Published: 2026-05-11
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the system_mgr.cgi CGI on the D-Link DNS‑320 router. By supplying crafted input to functions such as cgi_set_host, cgi_set_ntp, cgi_fan_control, or cgi_merge_user, an attacker can inject arbitrary operating‑system commands. This enables the execution of unintended commands on the device, potentially giving an attacker a shell or full control of the router. Because the flaw can be triggered remotely, it poses a risk to the confidentiality, integrity, and availability of the device and any network it serves.

Affected Systems

Affected system is the D-Link DNS‑320 NAS/router running firmware version 2.06B01. The flaw exists in the cgi_set_host, cgi_set_ntp, cgi_fan_control, and cgi_merge_user CGI scripts located in /cgi-bin/system_mgr.cgi. No other products or versions were listed.

Risk and Exploitability

The CVSS score of 5.1 indicates medium severity. No EPSS score is available and the vulnerability is not listed in CISA’s KEV catalog, suggesting limited evidence of active exploitation. The weakness belongs to command injection and can be exploited remotely over the device’s web interface; the CGI functions appear to accept unauthenticated or default credentials. The attack vector is therefore remote and requires network access to the management interface.

Generated by OpenCVE AI on May 11, 2026 at 06:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the latest firmware update from D-Link that patches the command injection in system_mgr.cgi.
  • Restrict external access to the router’s management interface by configuring firewall rules or placing the device behind a VPN.
  • Disable or block the vulnerable CGI scripts (cgi_set_host, cgi_set_ntp, cgi_fan_control, cgi_merge_user) through the router’s web‑access control if possible.

Generated by OpenCVE AI on May 11, 2026 at 06:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dns-320
Dlink dns-320 Firmware
CPEs cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-320_firmware:2.06b01:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dns-320
Dlink dns-320 Firmware

Mon, 11 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 06:45:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link dns-320
Vendors & Products D-link
D-link dns-320

Mon, 11 May 2026 05:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in D-Link DNS-320 2.06B01. This impacts the function cgi_set_host/cgi_set_ntp/cgi_fan_control/cgi_merge_user of the file /cgi-bin/system_mgr.cgi. This manipulation causes os command injection. It is possible to initiate the attack remotely.
Title D-Link DNS-320 system_mgr.cgi cgi_merge_user os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:ND/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X'}


Subscriptions

D-link Dns-320
Dlink Dns-320 Dns-320 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-11T14:16:09.030Z

Reserved: 2026-05-10T15:53:58.810Z

Link: CVE-2026-8273

cve-icon Vulnrichment

Updated: 2026-05-11T14:14:03.676Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-11T05:16:16.417

Modified: 2026-05-11T20:31:28.817

Link: CVE-2026-8273

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T06:30:29Z

Weaknesses