Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4196: Command Injection in D-Link DNS-120

0
Medium
VulnerabilityCVE-2026-4196cvecve-2026-4196
Published: Sun Mar 15 2026 (03/15/2026, 23:32:11 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DNS-120

Description

CVE-2026-4196 is a command injection vulnerability affecting multiple D-Link network-attached storage (NAS) devices, including the DNS-120 and several other models. The flaw exists in the /cgi-bin/remote_backup. cgi script, specifically in functions handling remote backup and scheduling operations. An attacker can remotely exploit this vulnerability without authentication or user interaction to execute arbitrary commands on the device. The vulnerability has a CVSS 4. 0 base score of 5. 3, indicating medium severity, with low complexity and no privileges required. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. Organizations using affected D-Link NAS devices should prioritize patching or apply mitigations to prevent remote command execution. This vulnerability poses risks to confidentiality, integrity, and availability of data stored on these devices.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 00:43:54 UTC

Technical Analysis

CVE-2026-4196 is a remotely exploitable command injection vulnerability found in multiple D-Link NAS devices, including the DNS-120 and a broad range of other models such as DNS-315L, DNS-320, DNS-323, DNS-340L, and DNS-1550-04. The vulnerability resides in the /cgi-bin/remote_backup.cgi script, specifically within the functions cgi_recovery, cgi_backup_now, cgi_set_schedule, and cgi_set_rsync_server. These functions handle remote backup operations and scheduling, and due to improper input validation or sanitization, an attacker can inject arbitrary shell commands. The attack vector is network-based, requiring no authentication or user interaction, making it easier for attackers to exploit remotely. The CVSS 4.0 vector indicates low attack complexity, no privileges required, and no user interaction, but with limited scope and impact on confidentiality, integrity, and availability. The vulnerability affects firmware versions up to 20260205. Although no exploits are currently reported in the wild, the public disclosure increases the likelihood of exploitation attempts. The affected devices are commonly used in small to medium business and home environments for network storage and backup, making them attractive targets for attackers seeking to gain persistent access or disrupt data availability. The lack of patches or official mitigation guidance in the provided data suggests that users must rely on network-level controls and disabling vulnerable features until vendor updates are available.

Potential Impact

The impact of CVE-2026-4196 is significant for organizations relying on affected D-Link NAS devices for critical data storage and backup. Successful exploitation allows remote attackers to execute arbitrary commands on the device, potentially leading to full compromise of the NAS system. This can result in unauthorized data access, data modification, deletion, or ransomware deployment. The compromise of backup systems can disrupt business continuity and data recovery processes. Since the vulnerability requires no authentication, attackers can scan for exposed devices and exploit them en masse, increasing the risk of widespread attacks. The medium CVSS score reflects moderate impact, but the ease of exploitation and the critical role of these devices in data infrastructure elevate the threat. Organizations with poor network segmentation or exposed management interfaces are particularly vulnerable. Additionally, attackers could use compromised NAS devices as footholds for lateral movement within corporate networks, escalating the overall security risk.

Mitigation Recommendations

To mitigate CVE-2026-4196, organizations should implement the following specific actions: 1) Immediately restrict network access to the affected NAS devices, especially blocking external internet access to management and backup-related CGI endpoints. 2) Disable remote backup and scheduling features (cgi_recovery, cgi_backup_now, cgi_set_schedule, cgi_set_rsync_server) if they are not essential to operations. 3) Employ network segmentation and firewall rules to isolate NAS devices from untrusted networks and limit access to trusted administrators only. 4) Monitor network traffic and device logs for unusual commands or access patterns targeting the /cgi-bin/remote_backup.cgi script. 5) Engage with D-Link support or official channels to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 6) Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures for command injection attempts targeting these devices. 7) Educate IT staff about the risks of exposed NAS devices and enforce strong administrative access controls. 8) If patching is delayed, consider temporary replacement or removal of vulnerable devices from critical network segments to reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-15T08:22:51.610Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b745e29d4df451838ed4b3

Added to database: 3/15/2026, 11:50:58 PM

Last enriched: 3/23/2026, 12:43:54 AM

Last updated: 4/30/2026, 3:13:16 AM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses