CVE-2026-8272
Published: 11 May 2026
Summary
CVE-2026-8272 is a medium-severity Command Injection (CWE-77) vulnerability in Dlink Dns-320 Firmware. Its CVSS base score is 4.7 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 12.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote OS command injection in public-facing CGI script directly enables T1190 exploitation and Unix shell command execution via T1059.004.
NVD Description
A security flaw has been discovered in D-Link DNS-320 2.06B01. This affects the function delete/rename/copy/move/chmod/chown of the file /cgi-bin/webfile_mgr.cgi. The manipulation results in os command injection. The attack may be performed from remote. The exploit has been released to the…
more
public and may be used for attacks.
Deeper analysisAI
Automated synthesis unavailable for this CVE.
Details
- CWE(s)