Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2085: Command Injection in D-Link DWR-M921

0
High
VulnerabilityCVE-2026-2085cvecve-2026-2085
Published: Sat Feb 07 2026 (02/07/2026, 12:02:08 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M921

Description

CVE-2026-2085 is a high-severity command injection vulnerability affecting D-Link DWR-M921 version 1. 1. 50. The flaw exists in the USSD Configuration Endpoint, specifically in the sub_419F20 function of /boafrm/formUSSDSetup, where manipulation of the ussdValue parameter allows remote attackers to execute arbitrary commands. Exploitation requires no user interaction and no privileges, making it remotely exploitable over the network. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. This vulnerability can lead to full system compromise, impacting confidentiality, integrity, and availability of the affected device. European organizations using this router model, especially in telecommunications or remote connectivity roles, are at risk. Mitigation requires immediate firmware updates from D-Link once available or applying network-level protections to restrict access to the vulnerable endpoint. Countries with higher adoption of D-Link networking equipment and significant telecom infrastructure are more likely to be targeted.

AI-Powered Analysis

AILast updated: 02/07/2026, 12:29:37 UTC

Technical Analysis

CVE-2026-2085 is a command injection vulnerability identified in the D-Link DWR-M921 router, specifically version 1.1.50. The vulnerability resides in the USSD Configuration Endpoint, within the function sub_419F20 located in the /boafrm/formUSSDSetup resource. The issue arises from improper sanitization or validation of the ussdValue parameter, which an attacker can manipulate to inject arbitrary system commands. Since the vulnerability is remotely exploitable without requiring user interaction or privileges, an attacker can send crafted requests to the affected endpoint over the network to execute arbitrary commands on the device. This can lead to full compromise of the router, allowing attackers to control device functionality, intercept or manipulate network traffic, or pivot into internal networks. The CVSS 4.0 base score of 8.6 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation (network attack vector, no user interaction, no privileges required). Although no known exploits are currently active in the wild, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The DWR-M921 is commonly used in remote wireless broadband scenarios, making this vulnerability particularly concerning for organizations relying on these devices for critical connectivity. The lack of an official patch at the time of disclosure necessitates immediate mitigation through network segmentation, access controls, and monitoring for suspicious activity targeting the USSD endpoint.

Potential Impact

The impact of CVE-2026-2085 on European organizations can be significant, especially for those utilizing the D-Link DWR-M921 routers in their network infrastructure. Successful exploitation allows attackers to execute arbitrary commands remotely, potentially leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network services, and use of compromised devices as footholds for further attacks. Telecommunications providers, enterprises with remote sites, and critical infrastructure operators using these routers are at heightened risk. The compromise of such devices could undermine network integrity and availability, impacting business continuity and data confidentiality. Furthermore, attackers could leverage compromised routers to launch attacks against other internal systems or external targets, amplifying the threat. Given the router’s role in providing network connectivity, exploitation could also disrupt communications, affecting operational capabilities across affected organizations.

Mitigation Recommendations

1. Immediate action should focus on restricting network access to the USSD Configuration Endpoint (/boafrm/formUSSDSetup) by implementing firewall rules or access control lists (ACLs) that limit access to trusted management hosts only. 2. Monitor network traffic for unusual or unauthorized requests targeting the vulnerable endpoint, using intrusion detection/prevention systems (IDS/IPS) with updated signatures. 3. Disable remote management interfaces if not strictly necessary, or restrict them to secure VPN connections to reduce exposure. 4. Engage with D-Link support channels to obtain official firmware updates or patches addressing this vulnerability as soon as they become available. 5. If patching is delayed, consider deploying network segmentation to isolate vulnerable routers from critical internal networks. 6. Conduct thorough audits of affected devices to detect any signs of compromise or unauthorized command execution. 7. Educate network administrators on the risks of USSD endpoint exposure and ensure secure configuration practices are followed. 8. Implement strong authentication and logging on management interfaces to detect and prevent unauthorized access attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T08:20:31.394Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69872ccdf9fa50a62f8287cd

Added to database: 2/7/2026, 12:15:09 PM

Last enriched: 2/7/2026, 12:29:37 PM

Last updated: 2/7/2026, 1:19:57 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats