CVE-2026-2085: Command Injection in D-Link DWR-M921
CVE-2026-2085 is a high-severity command injection vulnerability affecting D-Link DWR-M921 version 1. 1. 50. The flaw exists in the USSD Configuration Endpoint, specifically in the sub_419F20 function of /boafrm/formUSSDSetup, where manipulation of the ussdValue parameter allows remote attackers to execute arbitrary commands. Exploitation requires no user interaction and no privileges, making it remotely exploitable over the network. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. This vulnerability can lead to full system compromise, impacting confidentiality, integrity, and availability of the affected device. European organizations using this router model, especially in telecommunications or remote connectivity roles, are at risk. Mitigation requires immediate firmware updates from D-Link once available or applying network-level protections to restrict access to the vulnerable endpoint. Countries with higher adoption of D-Link networking equipment and significant telecom infrastructure are more likely to be targeted.
AI Analysis
Technical Summary
CVE-2026-2085 is a command injection vulnerability identified in the D-Link DWR-M921 router, specifically version 1.1.50. The vulnerability resides in the USSD Configuration Endpoint, within the function sub_419F20 located in the /boafrm/formUSSDSetup resource. The issue arises from improper sanitization or validation of the ussdValue parameter, which an attacker can manipulate to inject arbitrary system commands. Since the vulnerability is remotely exploitable without requiring user interaction or privileges, an attacker can send crafted requests to the affected endpoint over the network to execute arbitrary commands on the device. This can lead to full compromise of the router, allowing attackers to control device functionality, intercept or manipulate network traffic, or pivot into internal networks. The CVSS 4.0 base score of 8.6 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation (network attack vector, no user interaction, no privileges required). Although no known exploits are currently active in the wild, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The DWR-M921 is commonly used in remote wireless broadband scenarios, making this vulnerability particularly concerning for organizations relying on these devices for critical connectivity. The lack of an official patch at the time of disclosure necessitates immediate mitigation through network segmentation, access controls, and monitoring for suspicious activity targeting the USSD endpoint.
Potential Impact
The impact of CVE-2026-2085 on European organizations can be significant, especially for those utilizing the D-Link DWR-M921 routers in their network infrastructure. Successful exploitation allows attackers to execute arbitrary commands remotely, potentially leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network services, and use of compromised devices as footholds for further attacks. Telecommunications providers, enterprises with remote sites, and critical infrastructure operators using these routers are at heightened risk. The compromise of such devices could undermine network integrity and availability, impacting business continuity and data confidentiality. Furthermore, attackers could leverage compromised routers to launch attacks against other internal systems or external targets, amplifying the threat. Given the router’s role in providing network connectivity, exploitation could also disrupt communications, affecting operational capabilities across affected organizations.
Mitigation Recommendations
1. Immediate action should focus on restricting network access to the USSD Configuration Endpoint (/boafrm/formUSSDSetup) by implementing firewall rules or access control lists (ACLs) that limit access to trusted management hosts only. 2. Monitor network traffic for unusual or unauthorized requests targeting the vulnerable endpoint, using intrusion detection/prevention systems (IDS/IPS) with updated signatures. 3. Disable remote management interfaces if not strictly necessary, or restrict them to secure VPN connections to reduce exposure. 4. Engage with D-Link support channels to obtain official firmware updates or patches addressing this vulnerability as soon as they become available. 5. If patching is delayed, consider deploying network segmentation to isolate vulnerable routers from critical internal networks. 6. Conduct thorough audits of affected devices to detect any signs of compromise or unauthorized command execution. 7. Educate network administrators on the risks of USSD endpoint exposure and ensure secure configuration practices are followed. 8. Implement strong authentication and logging on management interfaces to detect and prevent unauthorized access attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2026-2085: Command Injection in D-Link DWR-M921
Description
CVE-2026-2085 is a high-severity command injection vulnerability affecting D-Link DWR-M921 version 1. 1. 50. The flaw exists in the USSD Configuration Endpoint, specifically in the sub_419F20 function of /boafrm/formUSSDSetup, where manipulation of the ussdValue parameter allows remote attackers to execute arbitrary commands. Exploitation requires no user interaction and no privileges, making it remotely exploitable over the network. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. This vulnerability can lead to full system compromise, impacting confidentiality, integrity, and availability of the affected device. European organizations using this router model, especially in telecommunications or remote connectivity roles, are at risk. Mitigation requires immediate firmware updates from D-Link once available or applying network-level protections to restrict access to the vulnerable endpoint. Countries with higher adoption of D-Link networking equipment and significant telecom infrastructure are more likely to be targeted.
AI-Powered Analysis
Technical Analysis
CVE-2026-2085 is a command injection vulnerability identified in the D-Link DWR-M921 router, specifically version 1.1.50. The vulnerability resides in the USSD Configuration Endpoint, within the function sub_419F20 located in the /boafrm/formUSSDSetup resource. The issue arises from improper sanitization or validation of the ussdValue parameter, which an attacker can manipulate to inject arbitrary system commands. Since the vulnerability is remotely exploitable without requiring user interaction or privileges, an attacker can send crafted requests to the affected endpoint over the network to execute arbitrary commands on the device. This can lead to full compromise of the router, allowing attackers to control device functionality, intercept or manipulate network traffic, or pivot into internal networks. The CVSS 4.0 base score of 8.6 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation (network attack vector, no user interaction, no privileges required). Although no known exploits are currently active in the wild, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The DWR-M921 is commonly used in remote wireless broadband scenarios, making this vulnerability particularly concerning for organizations relying on these devices for critical connectivity. The lack of an official patch at the time of disclosure necessitates immediate mitigation through network segmentation, access controls, and monitoring for suspicious activity targeting the USSD endpoint.
Potential Impact
The impact of CVE-2026-2085 on European organizations can be significant, especially for those utilizing the D-Link DWR-M921 routers in their network infrastructure. Successful exploitation allows attackers to execute arbitrary commands remotely, potentially leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network services, and use of compromised devices as footholds for further attacks. Telecommunications providers, enterprises with remote sites, and critical infrastructure operators using these routers are at heightened risk. The compromise of such devices could undermine network integrity and availability, impacting business continuity and data confidentiality. Furthermore, attackers could leverage compromised routers to launch attacks against other internal systems or external targets, amplifying the threat. Given the router’s role in providing network connectivity, exploitation could also disrupt communications, affecting operational capabilities across affected organizations.
Mitigation Recommendations
1. Immediate action should focus on restricting network access to the USSD Configuration Endpoint (/boafrm/formUSSDSetup) by implementing firewall rules or access control lists (ACLs) that limit access to trusted management hosts only. 2. Monitor network traffic for unusual or unauthorized requests targeting the vulnerable endpoint, using intrusion detection/prevention systems (IDS/IPS) with updated signatures. 3. Disable remote management interfaces if not strictly necessary, or restrict them to secure VPN connections to reduce exposure. 4. Engage with D-Link support channels to obtain official firmware updates or patches addressing this vulnerability as soon as they become available. 5. If patching is delayed, consider deploying network segmentation to isolate vulnerable routers from critical internal networks. 6. Conduct thorough audits of affected devices to detect any signs of compromise or unauthorized command execution. 7. Educate network administrators on the risks of USSD endpoint exposure and ensure secure configuration practices are followed. 8. Implement strong authentication and logging on management interfaces to detect and prevent unauthorized access attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-06T08:20:31.394Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69872ccdf9fa50a62f8287cd
Added to database: 2/7/2026, 12:15:09 PM
Last enriched: 2/7/2026, 12:29:37 PM
Last updated: 2/7/2026, 1:19:57 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.