CVE-2026-4197: Command Injection in D-Link DNS-120
CVE-2026-4197 is a command injection vulnerability affecting multiple D-Link NAS devices, including the DNS-120 and various other models. The flaw exists in the /cgi-bin/download_mgr. cgi script, specifically in functions handling RSS feed updates and downloads. An attacker can remotely exploit this vulnerability without authentication or user interaction, injecting arbitrary commands on the device. The vulnerability has a CVSS 4. 0 base score of 5. 3, indicating medium severity. Although no public exploits are currently known in the wild, the exploit code has been made public, increasing the risk of future attacks. Successful exploitation could lead to unauthorized command execution, potentially compromising device integrity and availability. Organizations using affected D-Link NAS devices should prioritize patching or applying mitigations to prevent exploitation.
AI Analysis
Technical Summary
CVE-2026-4197 is a command injection vulnerability identified in multiple D-Link NAS devices, including DNS-120, DNS-320, DNS-323, DNS-326, DNS-340L, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05, DNS-1550-04, and others, up to firmware version 20260205. The vulnerability resides in the CGI script /cgi-bin/download_mgr.cgi, specifically in functions related to RSS feed management such as RSS_Get_Update_Status, RSS_Update, RSS_Channel_AutoDownload, RSS_Add, RSS_Channel_Item_Download, RSS_History_Item_List, and RSS_Item_List. These functions improperly handle user-supplied input, allowing an attacker to inject arbitrary commands that the device executes. The attack vector is remote and does not require authentication or user interaction, making it easier to exploit. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although the impact is rated low on CIA triad components, command injection can lead to full system compromise depending on the commands executed. No patches or official fixes have been linked yet, and no known exploits are reported in the wild, but public exploit code availability increases the risk of exploitation. The vulnerability affects devices commonly used in small to medium business and home environments for network-attached storage, making it a significant concern for data integrity and device availability.
Potential Impact
The primary impact of CVE-2026-4197 is unauthorized remote command execution on affected D-Link NAS devices. This can lead to compromise of device integrity, unauthorized access to stored data, disruption of NAS services, and potential pivoting to other network resources. Organizations relying on these devices for critical data storage or backup may face data loss, data leakage, or operational downtime. Since the attack requires no authentication and no user interaction, the attack surface is broad, especially if devices are exposed to untrusted networks or the internet. The medium CVSS score reflects moderate risk, but the actual impact can escalate if attackers leverage the vulnerability to deploy malware, ransomware, or establish persistent backdoors. The vulnerability also poses risks to supply chain security if these devices are used in enterprise environments. Overall, the threat could disrupt business continuity and compromise sensitive information.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of affected D-Link NAS devices, ideally limiting access to trusted internal networks only. 2. Disable or restrict RSS feed update features and any related CGI scripts if not essential to operations. 3. Monitor network traffic and device logs for unusual commands or access patterns targeting /cgi-bin/download_mgr.cgi or related RSS functions. 4. Apply any available firmware updates or patches from D-Link as soon as they are released; if no official patch exists, contact D-Link support for guidance. 5. Implement network segmentation to isolate NAS devices from critical infrastructure and limit lateral movement in case of compromise. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting command injection attempts on these devices. 7. Regularly back up NAS data and verify backup integrity to enable recovery in case of compromise. 8. Educate IT staff about this vulnerability and ensure incident response plans include steps for NAS device compromise. These steps go beyond generic advice by focusing on disabling vulnerable features, network access controls, and proactive monitoring specific to the affected CGI functions.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Australia, Canada, Brazil, India
CVE-2026-4197: Command Injection in D-Link DNS-120
Description
CVE-2026-4197 is a command injection vulnerability affecting multiple D-Link NAS devices, including the DNS-120 and various other models. The flaw exists in the /cgi-bin/download_mgr. cgi script, specifically in functions handling RSS feed updates and downloads. An attacker can remotely exploit this vulnerability without authentication or user interaction, injecting arbitrary commands on the device. The vulnerability has a CVSS 4. 0 base score of 5. 3, indicating medium severity. Although no public exploits are currently known in the wild, the exploit code has been made public, increasing the risk of future attacks. Successful exploitation could lead to unauthorized command execution, potentially compromising device integrity and availability. Organizations using affected D-Link NAS devices should prioritize patching or applying mitigations to prevent exploitation.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-4197 is a command injection vulnerability identified in multiple D-Link NAS devices, including DNS-120, DNS-320, DNS-323, DNS-326, DNS-340L, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05, DNS-1550-04, and others, up to firmware version 20260205. The vulnerability resides in the CGI script /cgi-bin/download_mgr.cgi, specifically in functions related to RSS feed management such as RSS_Get_Update_Status, RSS_Update, RSS_Channel_AutoDownload, RSS_Add, RSS_Channel_Item_Download, RSS_History_Item_List, and RSS_Item_List. These functions improperly handle user-supplied input, allowing an attacker to inject arbitrary commands that the device executes. The attack vector is remote and does not require authentication or user interaction, making it easier to exploit. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although the impact is rated low on CIA triad components, command injection can lead to full system compromise depending on the commands executed. No patches or official fixes have been linked yet, and no known exploits are reported in the wild, but public exploit code availability increases the risk of exploitation. The vulnerability affects devices commonly used in small to medium business and home environments for network-attached storage, making it a significant concern for data integrity and device availability.
Potential Impact
The primary impact of CVE-2026-4197 is unauthorized remote command execution on affected D-Link NAS devices. This can lead to compromise of device integrity, unauthorized access to stored data, disruption of NAS services, and potential pivoting to other network resources. Organizations relying on these devices for critical data storage or backup may face data loss, data leakage, or operational downtime. Since the attack requires no authentication and no user interaction, the attack surface is broad, especially if devices are exposed to untrusted networks or the internet. The medium CVSS score reflects moderate risk, but the actual impact can escalate if attackers leverage the vulnerability to deploy malware, ransomware, or establish persistent backdoors. The vulnerability also poses risks to supply chain security if these devices are used in enterprise environments. Overall, the threat could disrupt business continuity and compromise sensitive information.
Mitigation Recommendations
1. Immediately restrict network access to the management interfaces of affected D-Link NAS devices, ideally limiting access to trusted internal networks only. 2. Disable or restrict RSS feed update features and any related CGI scripts if not essential to operations. 3. Monitor network traffic and device logs for unusual commands or access patterns targeting /cgi-bin/download_mgr.cgi or related RSS functions. 4. Apply any available firmware updates or patches from D-Link as soon as they are released; if no official patch exists, contact D-Link support for guidance. 5. Implement network segmentation to isolate NAS devices from critical infrastructure and limit lateral movement in case of compromise. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting command injection attempts on these devices. 7. Regularly back up NAS data and verify backup integrity to enable recovery in case of compromise. 8. Educate IT staff about this vulnerability and ensure incident response plans include steps for NAS device compromise. These steps go beyond generic advice by focusing on disabling vulnerable features, network access controls, and proactive monitoring specific to the affected CGI functions.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-15T08:22:57.970Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b745e29d4df451838ed4be
Added to database: 3/15/2026, 11:50:58 PM
Last enriched: 3/23/2026, 12:44:13 AM
Last updated: 4/29/2026, 8:26:00 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.