A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected is the function RSS_Get_Update_Status/RSS_Update/RSS_Channel_AutoDownlaod/RSS_Add/RSS_Channel_Item_Downlaod/RSS_History_Item_List/RSS_Item_List of the file /cgi-bin/download_mgr.cgi. The manipulation results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.
https://vuldb.com/?submit.770364
https://vuldb.com/?submit.770363
https://vuldb.com/?submit.769870
https://vuldb.com/?submit.769869
https://vuldb.com/?submit.769868
https://vuldb.com/?submit.769867
https://vuldb.com/?submit.769866
https://vuldb.com/?submit.769865
https://vuldb.com/?submit.769864
https://vuldb.com/?ctiid.351109
https://github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_103/103.md
https://github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_102/102.md
Published: 2026-03-15
Base Score: 6.5
Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P
Severity: Medium
Base Score: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Severity: Medium
Base Score: 5.3
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
Severity: Medium