Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2168: Command Injection in D-Link DWR-M921

0
Medium
VulnerabilityCVE-2026-2168cvecve-2026-2168
Published: Sun Feb 08 2026 (02/08/2026, 17:32:08 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DWR-M921

Description

CVE-2026-2168 is a medium-severity command injection vulnerability in the D-Link DWR-M921 router firmware version 1. 1. 50. The flaw exists in the sub_419920 function within the /boafrm/formLtefotaUpgradeQuectel file, where manipulation of the fota_url argument allows remote attackers to execute arbitrary commands. Exploitation requires no user interaction and can be performed remotely without authentication, increasing risk. Although no known exploits are currently observed in the wild, a public exploit has been published, raising the likelihood of future attacks. The vulnerability impacts confidentiality, integrity, and availability by enabling command execution on the affected device. European organizations using this router model, especially in countries with higher D-Link market penetration and critical infrastructure reliance on such devices, face increased risk. Mitigation involves applying vendor patches once available, restricting access to router management interfaces, and monitoring network traffic for suspicious activity. Countries such as Germany, France, the UK, Italy, and Spain are most likely affected due to their significant use of D-Link networking equipment and strategic importance.

AI-Powered Analysis

AILast updated: 02/08/2026, 18:00:54 UTC

Technical Analysis

CVE-2026-2168 is a command injection vulnerability identified in the D-Link DWR-M921 router firmware version 1.1.50. The vulnerability resides in the function sub_419920 within the /boafrm/formLtefotaUpgradeQuectel file, specifically involving the fota_url parameter. An attacker can remotely manipulate this parameter to inject and execute arbitrary system commands on the device without requiring authentication or user interaction. This flaw arises due to insufficient input validation or sanitization of the fota_url argument, allowing command injection vectors. The vulnerability is remotely exploitable over the network, making it a significant risk for exposed devices. Although no active exploitation has been reported, a public exploit exists, increasing the threat landscape. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, lack of required privileges, and no user interaction needed, but limited scope and impact on confidentiality, integrity, and availability. The vulnerability could allow attackers to compromise device control, potentially leading to network disruption, data interception, or pivoting to internal networks. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through network-level controls and monitoring. This vulnerability highlights the importance of secure firmware development and timely patch management for network infrastructure devices.

Potential Impact

For European organizations, this vulnerability poses a moderate risk to network security and operational continuity. The D-Link DWR-M921 is used in various enterprise and possibly critical infrastructure environments, where compromised routers can serve as entry points for attackers. Successful exploitation could lead to unauthorized command execution, enabling attackers to disrupt network services, intercept or manipulate traffic, or establish persistent footholds for further attacks. Confidentiality may be compromised if attackers access sensitive network data, while integrity and availability could be affected through malicious command execution causing device malfunction or denial of service. The remote and unauthenticated nature of the exploit increases the attack surface, especially for organizations with exposed or poorly segmented network devices. Given the public availability of exploits, the risk of targeted attacks or automated scanning campaigns is elevated. European entities relying on this hardware should assess exposure and implement compensating controls promptly to prevent potential breaches or operational impacts.

Mitigation Recommendations

1. Immediately restrict access to the router’s management interfaces, especially from untrusted networks, using firewall rules or network segmentation. 2. Monitor network traffic for unusual requests targeting the /boafrm/formLtefotaUpgradeQuectel endpoint or suspicious fota_url parameter usage. 3. Disable remote management features if not required to reduce exposure. 4. Apply vendor-provided firmware updates or patches as soon as they become available to remediate the vulnerability. 5. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting command injection attempts targeting this vulnerability. 6. Conduct regular security audits of network devices to identify outdated firmware versions and unauthorized configuration changes. 7. Educate network administrators about this vulnerability and encourage prompt incident reporting and response. 8. Consider deploying network segmentation to isolate vulnerable devices from critical systems and sensitive data. 9. If patching is delayed, consider temporary mitigations such as web application firewalls (WAF) to block malicious payloads targeting the vulnerable parameter.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T10:31:19.129Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6988cbe84b57a58fa1bb3c39

Added to database: 2/8/2026, 5:46:16 PM

Last enriched: 2/8/2026, 6:00:54 PM

Last updated: 2/8/2026, 7:26:05 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats