Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4194: Improper Access Controls in D-Link DNS-120

0
Medium
VulnerabilityCVE-2026-4194cvecve-2026-4194
Published: Sun Mar 15 2026 (03/15/2026, 23:02:14 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DNS-120

Description

CVE-2026-4194 is a medium-severity vulnerability affecting multiple D-Link network-attached storage (NAS) devices, including the DNS-120 series and others. The flaw exists in the cgi_set_wto function within the /cgi-bin/system_mgr. cgi file, leading to improper access controls. This vulnerability allows remote attackers to manipulate the system without authentication or user interaction. Exploitation could result in unauthorized access or modification of device settings, potentially compromising confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of attacks. The vulnerability affects firmware versions up to 20260205. Organizations using these D-Link NAS devices should prioritize patching or apply mitigations to prevent exploitation. Countries with significant deployment of D-Link NAS devices and critical infrastructure relying on them are at higher risk. The CVSS 4.

AI-Powered Analysis

AILast updated: 03/15/2026, 23:20:33 UTC

Technical Analysis

CVE-2026-4194 is an improper access control vulnerability found in multiple D-Link NAS devices, including the DNS-120, DNS-315L, DNS-320 series, DNS-323, DNS-325, DNS-326, DNS-327L, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05, and DNS-1550-04 models running firmware versions up to 20260205. The vulnerability resides in the cgi_set_wto function within the /cgi-bin/system_mgr.cgi CGI script, which is responsible for managing system settings. Due to improper validation or enforcement of access controls, remote attackers can invoke this function to manipulate device configurations without requiring authentication or user interaction. This flaw allows attackers to bypass security restrictions remotely over the network, potentially leading to unauthorized configuration changes, data exposure, or disruption of device operations. The vulnerability has a CVSS 4.0 score of 6.9, indicating medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L). Although no active exploitation has been reported, a public exploit is available, increasing the risk of future attacks. The affected devices are widely used in small to medium enterprises and home environments for network storage and backup, making the vulnerability relevant to a broad user base. The lack of patches or official updates at the time of disclosure necessitates immediate mitigation efforts.

Potential Impact

The improper access control vulnerability in D-Link NAS devices can lead to unauthorized remote manipulation of device settings, potentially compromising the confidentiality, integrity, and availability of stored data and device operations. Attackers exploiting this flaw could alter configurations, disable security features, or disrupt NAS functionality, impacting business continuity and data security. Organizations relying on these devices for critical storage or backup services may face data breaches, loss of data integrity, or service outages. The ease of exploitation without authentication or user interaction increases the threat level, especially in environments where these devices are exposed to untrusted networks or the internet. While no known active exploitation exists yet, the availability of a public exploit raises the likelihood of attacks, particularly targeting organizations with weak network segmentation or outdated firmware. The impact is more severe for entities with sensitive data or critical infrastructure relying on these NAS devices, potentially leading to regulatory non-compliance, financial losses, and reputational damage.

Mitigation Recommendations

1. Immediately isolate affected D-Link NAS devices from untrusted networks, especially the internet, to reduce exposure. 2. Monitor network traffic and device logs for unusual access patterns targeting /cgi-bin/system_mgr.cgi or the cgi_set_wto function. 3. Apply any available firmware updates or patches from D-Link as soon as they are released addressing CVE-2026-4194. 4. If patches are unavailable, implement network-level access controls such as firewall rules or VPNs to restrict access to NAS management interfaces only to trusted administrators. 5. Disable remote management features if not required, or restrict them to secure management networks. 6. Employ strong network segmentation to separate NAS devices from critical infrastructure and sensitive data environments. 7. Regularly back up NAS data to offline or immutable storage to mitigate potential data loss or tampering. 8. Educate IT staff about the vulnerability and ensure incident response plans include steps for this specific threat. 9. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability to detect exploitation attempts. 10. Engage with D-Link support channels for guidance and updates on remediation timelines.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-15T08:22:37.852Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b73b569d4df45183888202

Added to database: 3/15/2026, 11:05:58 PM

Last enriched: 3/15/2026, 11:20:33 PM

Last updated: 3/16/2026, 5:15:11 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses