Cyber Posture

CVE-2026-4206

MediumPublic PoC

Published: 16 March 2026

Published
16 March 2026
Modified
19 March 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0022 44.0th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This affects the function FMT_rebuild_diskmgr/FMT_create_diskmgr/ScanDisk_run_e2fsck of the file /cgi-bin/dsk_mgr.cgi. Performing…

more

a manipulation results in command injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents command injection by enforcing validation of user inputs to the vulnerable /cgi-bin/dsk_mgr.cgi endpoints.

prevent

Requires timely remediation of the command injection flaw in affected D-Link NAS firmware through patching or updates.

prevent

Enforces least privilege for low-privileged authenticated users (PR:L), limiting the scope and impact of injected commands.

Security SummaryAI

CVE-2026-4206 is a command injection vulnerability affecting multiple D-Link Network Attached Storage (NAS) devices, including models DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05, and DNS-1550-04, in versions up to 20260205. The issue resides in the functions FMT_rebuild_diskmgr, FMT_create_diskmgr, and ScanDisk_run_e2fsck within the /cgi-bin/dsk_mgr.cgi script. It has been assigned CWE-74 and CWE-77, with a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), indicating medium severity.

The vulnerability enables remote command injection through manipulation of the affected CGI endpoints. Exploitation requires low privileges (PR:L), such as those of an authenticated user, with low attack complexity and no user interaction needed. Successful exploitation allows limited impacts on confidentiality, integrity, and availability, potentially enabling arbitrary command execution on the device.

References include GitHub repositories detailing the vulnerability (e.g., https://github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_138/138.md and vuln_139/139.md) and VulDB entries (https://vuldb.com/?ctiid.351118, https://vuldb.com/?id.351118, https://vuldb.com/?submit.770417). An exploit has been publicly disclosed, increasing the risk of active exploitation against unpatched devices. No specific patch or mitigation details are outlined in the available information.

Details

CWE(s)

Affected Products

dlink
dnr-202l firmware
≤ 2026-02-05
dlink
dnr-326 firmware
≤ 2026-02-05
dlink
dns-1100-4 firmware
≤ 2026-02-05
dlink
dns-120 firmware
≤ 2026-02-05
dlink
dns-1200-05 firmware
≤ 2026-02-05
dlink
dns-1550-04 firmware
≤ 2026-02-05
dlink
dns-315l firmware
≤ 2026-02-05
dlink
dns-320 firmware
≤ 2026-02-05
dlink
dns-320l firmware
≤ 2026-02-05
dlink
dns-320lw firmware
≤ 2026-02-05
+10 more product configuration(s) — see NVD for full list

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

The vulnerability is a remote command injection in a public-facing CGI script on D-Link NAS devices, enabling exploitation of public-facing applications (T1190) and arbitrary Unix shell command execution (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References