Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4195: Command Injection in D-Link DNS-120

0
Medium
VulnerabilityCVE-2026-4195cvecve-2026-4195
Published: Sun Mar 15 2026 (03/15/2026, 23:02:19 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DNS-120

Description

CVE-2026-4195 is a medium-severity command injection vulnerability affecting multiple D-Link network attached storage (NAS) devices, including the DNS-120 and related models. The flaw exists in an unspecified function within the /cgi-bin/wizard_mgr. cgi script, allowing remote attackers to execute arbitrary commands without authentication or user interaction. The vulnerability affects firmware versions up to 20260205. Although no known exploits are currently observed in the wild, proof-of-concept code has been published, increasing the risk of exploitation. The vulnerability's remote and unauthenticated nature makes it a significant threat to affected devices, potentially compromising confidentiality, integrity, and availability. Organizations using these D-Link NAS devices should prioritize patching or mitigating this issue to prevent unauthorized control or data breaches. Countries with high adoption of D-Link NAS products and critical infrastructure relying on these devices are at elevated risk. Immediate mitigation steps include restricting access to device management interfaces, network segmentation, and monitoring for suspicious activity until official patches are available.

AI-Powered Analysis

AILast updated: 03/15/2026, 23:20:18 UTC

Technical Analysis

CVE-2026-4195 is a command injection vulnerability identified in a broad range of D-Link NAS devices, including DNS-120, DNS-320 series, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05, DNS-1550-04, and others, all up to firmware version 20260205. The vulnerability resides in an unspecified function within the /cgi-bin/wizard_mgr.cgi CGI script, which is part of the device's web-based management interface. Due to improper input validation or sanitization, an attacker can remotely inject arbitrary commands that the device executes with elevated privileges. The attack vector requires no authentication or user interaction, making exploitation straightforward once the device is reachable over the network. The CVSS 4.0 base score is 5.3 (medium), reflecting the ease of remote exploitation but limited scope of impact due to partial confidentiality, integrity, and availability impact. No patches or official fixes have been linked yet, and no confirmed active exploitation is reported, but proof-of-concept exploits have been published, increasing the likelihood of future attacks. The vulnerability affects a wide array of D-Link NAS devices commonly used in small to medium business and home environments for file storage and sharing. Successful exploitation could allow attackers to execute arbitrary system commands, leading to data theft, device compromise, or denial of service.

Potential Impact

The impact of CVE-2026-4195 is significant for organizations relying on affected D-Link NAS devices for critical data storage and network services. Remote command injection can lead to full compromise of the device, allowing attackers to execute arbitrary commands with system-level privileges. This can result in unauthorized data access or exfiltration, modification or deletion of stored files, disruption of NAS services, and potential pivoting to other internal network resources. The vulnerability undermines confidentiality, integrity, and availability of the affected systems. Since the attack requires no authentication or user interaction, any exposed device on the internet or accessible internal network segment is at risk. Organizations with inadequate network segmentation or exposed management interfaces face elevated risk. The lack of an official patch at the time of disclosure increases the window of vulnerability. Additionally, the publication of exploit code raises the probability of automated scanning and exploitation attempts, potentially leading to widespread compromise in environments using these devices.

Mitigation Recommendations

1. Immediately restrict access to the web management interface of affected D-Link NAS devices by implementing network segmentation and firewall rules to limit access to trusted IP addresses only. 2. Disable remote management features if not strictly necessary to reduce exposure. 3. Monitor network traffic and device logs for unusual activity or command execution patterns indicative of exploitation attempts. 4. Apply any available firmware updates or patches from D-Link as soon as they are released. 5. If patches are not yet available, consider temporary mitigations such as disabling the vulnerable CGI endpoint (/cgi-bin/wizard_mgr.cgi) if feasible without disrupting critical functionality. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability or related exploit attempts. 7. Educate IT staff about the vulnerability and ensure incident response plans include steps for rapid containment and remediation. 8. Regularly audit device configurations to ensure minimal exposure and adherence to security best practices. 9. Consider replacing end-of-life or unsupported devices with newer, actively maintained hardware to reduce future risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-15T08:22:46.311Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b73b569d4df45183888209

Added to database: 3/15/2026, 11:05:58 PM

Last enriched: 3/15/2026, 11:20:18 PM

Last updated: 3/16/2026, 5:15:12 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses