Cyber Posture

CVE-2026-4197

MediumPublic PoC

Published: 16 March 2026

Published
16 March 2026
Modified
19 March 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0015 34.8th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected is the function RSS_Get_Update_Status/RSS_Update/RSS_Channel_AutoDownlaod/RSS_Add/RSS_Channel_Item_Downlaod/RSS_History_Item_List/RSS_Item_List of the file /cgi-bin/download_mgr.cgi. The…

more

manipulation results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the command injection flaw in the download_mgr.cgi RSS functions by identifying, reporting, and correcting the vulnerability in affected D-Link NAS firmware.

prevent

Validates and sanitizes inputs to the RSS functions in download_mgr.cgi to prevent command injection payloads from being executed.

prevent

Enforces least privilege on the processes handling RSS functions, limiting the scope and impact of any successful command injection by low-privileged attackers.

Security SummaryAI

CVE-2026-4197 is a command injection vulnerability affecting multiple D-Link Network Attached Storage (NAS) devices, including models DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05, and DNS-1550-04 running firmware versions up to 20260205. The issue resides in the RSS_Get_Update_Status, RSS_Update, RSS_Channel_AutoDownlaod, RSS_Add, RSS_Channel_Item_Downlaod, RSS_History_Item_List, and RSS_Item_List functions within the /cgi-bin/download_mgr.cgi file. It is classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component) and CWE-77 (Command Injection), with a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), indicating medium severity.

The vulnerability can be exploited remotely by an attacker with low privileges, such as an authenticated user, requiring low attack complexity and no user interaction. Successful exploitation allows arbitrary command injection, potentially leading to limited impacts on confidentiality, integrity, and availability, such as unauthorized data access, modification, or denial of service on the affected device.

Advisories referenced in VulDB entries (ctiid.351109, id.351109, submit.769864) and GitHub repositories detail the vulnerability disclosure, confirming that a public exploit is available, which could facilitate widespread targeting of unpatched D-Link NAS devices. No specific patches or vendor mitigations are detailed in the provided references.

The exploit has been publicly disclosed, increasing the risk of active exploitation against internet-exposed instances of these legacy D-Link NAS models.

Details

CWE(s)

Affected Products

dlink
dnr-202l firmware
≤ 2026-02-05
dlink
dnr-326 firmware
≤ 2026-02-05
dlink
dns-1100-4 firmware
≤ 2026-02-05
dlink
dns-120 firmware
≤ 2026-02-05
dlink
dns-1200-05 firmware
≤ 2026-02-05
dlink
dns-1550-04 firmware
≤ 2026-02-05
dlink
dns-315l firmware
≤ 2026-02-05
dlink
dns-320 firmware
≤ 2026-02-05
dlink
dns-320l firmware
≤ 2026-02-05
dlink
dns-320lw firmware
≤ 2026-02-05
+10 more product configuration(s) — see NVD for full list

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

CVE enables remote exploitation of public-facing CGI script (T1190) for arbitrary Unix shell command injection (T1059.004) on Linux-based NAS devices.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References