Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2193: Command Injection in D-Link DI-7100G C1

0
Medium
VulnerabilityCVE-2026-2193cvecve-2026-2193
Published: Sun Feb 08 2026 (02/08/2026, 23:02:11 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DI-7100G C1

Description

A vulnerability was detected in D-Link DI-7100G C1 24.04.18D1. Affected by this issue is the function set_jhttpd_info. Performing a manipulation of the argument usb_username results in command injection. Remote exploitation of the attack is possible.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:04:35 UTC

Technical Analysis

CVE-2026-2193 identifies a command injection vulnerability in the D-Link DI-7100G C1 router, specifically in firmware version 24.04.18D1. The vulnerability resides in the set_jhttpd_info function, which processes the usb_username parameter. Improper input validation or sanitization allows an attacker to inject arbitrary operating system commands through this parameter. Because the vulnerability can be exploited remotely without requiring authentication or user interaction, an attacker can execute commands on the device with the privileges of the affected service, potentially leading to unauthorized control. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the ease of remote exploitation but limited scope of impact (low to medium confidentiality, integrity, and availability impact). No known public exploits or patches are currently available, increasing the urgency for vendor response. The vulnerability affects a specific firmware version, so devices running other versions may not be vulnerable. The attack surface includes any exposed management interfaces or services that process the usb_username argument, which could be accessible over the network. This vulnerability exemplifies the risks of insufficient input validation in embedded device web services and highlights the need for secure coding practices in IoT and networking equipment firmware.

Potential Impact

The primary impact of CVE-2026-2193 is unauthorized command execution on affected D-Link DI-7100G C1 devices, which can compromise device confidentiality, integrity, and availability. Attackers could leverage this to execute arbitrary commands, potentially gaining control over the device, altering configurations, or disrupting network services. This could lead to network outages, interception or manipulation of network traffic, or pivoting attacks into internal networks. Organizations relying on these routers for critical connectivity or security functions may experience degraded network reliability and increased risk of data breaches. Although the vulnerability requires no authentication, the medium severity score suggests some limitations in the extent of damage, possibly due to privilege restrictions or partial impact on system components. The absence of known exploits reduces immediate widespread risk but does not eliminate the threat of future exploitation. The vulnerability is particularly concerning for environments where these devices are exposed to untrusted networks or the internet, increasing the likelihood of remote attacks.

Mitigation Recommendations

To mitigate CVE-2026-2193, organizations should first verify if their D-Link DI-7100G C1 devices run the vulnerable firmware version 24.04.18D1. If so, they should monitor D-Link's official channels for firmware updates or patches addressing this vulnerability and apply them promptly once available. In the absence of patches, network administrators should restrict access to device management interfaces by implementing network segmentation and firewall rules to limit exposure to trusted networks only. Employing intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious payloads targeting the usb_username parameter can reduce exploitation risk. Disabling unnecessary services or remote management features on the device can further minimize the attack surface. Regularly auditing device configurations and logs for anomalous activity related to command injection attempts is recommended. Additionally, organizations should consider replacing outdated or unsupported devices with newer models that follow secure development practices and receive timely security updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T17:32:45.833Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6989193f4b57a58fa1d8c2ef

Added to database: 2/8/2026, 11:16:15 PM

Last enriched: 2/23/2026, 9:04:35 PM

Last updated: 3/26/2026, 3:52:34 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses