Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2260: OS Command Injection in D-Link DCS-931L

0
High
VulnerabilityCVE-2026-2260cvecve-2026-2260
Published: Tue Feb 10 2026 (02/10/2026, 03:02:07 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DCS-931L

Description

CVE-2026-2260 is a high-severity OS command injection vulnerability affecting the D-Link DCS-931L IP camera firmware versions up to 1. 13. 0. The flaw exists in the /goform/setSysAdmin endpoint, where manipulation of the AdminID parameter allows remote attackers to execute arbitrary OS commands without authentication or user interaction. Although the affected product is no longer supported by D-Link, the exploit code has been publicly disclosed, increasing the risk of exploitation. This vulnerability can lead to full system compromise, including confidentiality, integrity, and availability impacts. No official patches are available due to end-of-life status, and no known exploits have been observed in the wild yet. European organizations using these legacy devices in their networks are at risk, especially those with IP camera deployments in critical infrastructure or enterprise environments. Mitigation requires device replacement or network-level controls to isolate vulnerable devices from untrusted networks. Countries with higher market penetration of D-Link products and significant critical infrastructure deployments are more likely to be affected.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:36:00 UTC

Technical Analysis

CVE-2026-2260 is an OS command injection vulnerability identified in the D-Link DCS-931L IP camera firmware versions 1.0 through 1.13.0. The vulnerability resides in the /goform/setSysAdmin endpoint, specifically in the handling of the AdminID parameter. An attacker can remotely send crafted requests to this endpoint, injecting arbitrary operating system commands due to insufficient input validation or sanitization. This flaw does not require authentication or user interaction, making it remotely exploitable over the network. The vulnerability has a CVSS 4.0 base score of 8.6, indicating high severity, with network attack vector, low attack complexity, and no privileges required. The impact includes potential full compromise of the device, allowing attackers to execute arbitrary commands, potentially leading to data theft, device manipulation, or pivoting into internal networks. The product is no longer supported by D-Link, and no patches or firmware updates are available. Although no known exploits have been observed in the wild, the public disclosure of exploit code increases the risk of active exploitation. The DCS-931L is a widely deployed consumer and small business IP camera, often used in surveillance and monitoring scenarios. The lack of vendor support and patch availability means affected devices remain vulnerable indefinitely unless replaced or mitigated through network controls.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on D-Link DCS-931L cameras in security-sensitive environments such as government facilities, critical infrastructure, healthcare, and enterprise campuses. Successful exploitation can lead to unauthorized remote command execution, resulting in full device compromise. Attackers could exfiltrate sensitive video feeds, manipulate device settings, disrupt surveillance operations, or use the compromised device as a foothold to launch further attacks within the internal network. The absence of vendor support and patches increases the risk of long-term exposure. Additionally, the public availability of exploit code lowers the barrier for attackers, including cybercriminals and nation-state actors, to weaponize this vulnerability. The potential confidentiality, integrity, and availability impacts elevate the risk profile for organizations using these legacy devices, necessitating urgent mitigation to prevent exploitation.

Mitigation Recommendations

Given the end-of-life status of the D-Link DCS-931L and lack of official patches, the primary mitigation is to replace all affected devices with newer, supported models that receive regular security updates. Until replacement is feasible, organizations should implement strict network segmentation to isolate vulnerable cameras from critical systems and untrusted networks, using VLANs or firewall rules to restrict inbound and outbound traffic. Deploy network intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection to monitor for suspicious activity targeting the /goform/setSysAdmin endpoint. Disable remote management interfaces if not required, or restrict access to trusted IP addresses only. Regularly audit network devices for legacy or unsupported hardware and maintain an asset inventory to identify at-risk devices. Employ strong network access controls and monitor logs for unusual command execution patterns. Educate security teams about this vulnerability and the risks of unsupported IoT devices to prioritize remediation efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-09T16:58:34.510Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698aaa0c4b57a58fa1c64d82

Added to database: 2/10/2026, 3:46:20 AM

Last enriched: 2/17/2026, 9:36:00 AM

Last updated: 2/20/2026, 11:14:03 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats