CVE-2026-4196

medium

Description

A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This impacts the function cgi_recovery/cgi_backup_now/cgi_set_schedule/cgi_set_rsync_server of the file /cgi-bin/remote_backup.cgi. The manipulation leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.

References

https://www.dlink.com/

https://vuldb.com/?submit.769858

https://vuldb.com/?submit.769857

https://vuldb.com/?submit.769856

https://vuldb.com/?submit.769855

https://vuldb.com/?id.351108

https://vuldb.com/?ctiid.351108

https://github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_99/99.md

https://github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_98/98.md

Details

Source: Mitre, NVD

Published: 2026-03-15

Risk Information

CVSS v2

Base Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 6.3

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Severity: Medium

CVSS v4

Base Score: 5.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Severity: Medium