Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4197: Command Injection in D-Link DNS-120

0
Medium
VulnerabilityCVE-2026-4197cvecve-2026-4197
Published: Sun Mar 15 2026 (03/15/2026, 23:32:15 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DNS-120

Description

CVE-2026-4197 is a medium-severity command injection vulnerability affecting multiple D-Link NAS devices, including the DNS-120 and many related models. The flaw exists in the /cgi-bin/download_mgr. cgi script, specifically in functions handling RSS feed updates and downloads. An attacker can remotely exploit this vulnerability without authentication or user interaction, injecting arbitrary commands on the device. This could lead to unauthorized control or disruption of affected NAS devices. Although no known exploits are currently active in the wild, the public availability of the exploit increases risk. The vulnerability impacts confidentiality, integrity, and availability of data stored on these devices. Organizations using these D-Link NAS models should prioritize patching or mitigating this issue. Countries with significant D-Link NAS deployments and critical infrastructure reliance on these devices are at higher risk. Immediate mitigation steps include disabling vulnerable services, restricting network access to management interfaces, and monitoring for suspicious activity.

AI-Powered Analysis

AILast updated: 03/16/2026, 00:05:35 UTC

Technical Analysis

CVE-2026-4197 is a command injection vulnerability identified in a broad range of D-Link NAS devices, including the DNS-120 series and multiple other models. The vulnerability resides in the CGI script /cgi-bin/download_mgr.cgi, specifically within functions related to RSS feed management such as RSS_Get_Update_Status, RSS_Update, RSS_Channel_AutoDownload, RSS_Add, RSS_Channel_Item_Download, RSS_History_Item_List, and RSS_Item_List. These functions improperly sanitize user input, allowing an attacker to inject arbitrary shell commands. The vulnerability can be exploited remotely without requiring authentication or user interaction, which significantly increases the attack surface. Exploitation could allow an attacker to execute arbitrary commands with the privileges of the web server process, potentially leading to unauthorized access, data leakage, or disruption of NAS services. The vulnerability affects firmware versions up to 20260205. Although no exploits have been reported in the wild, the public disclosure of the exploit code heightens the risk of active exploitation. The CVSS 4.0 base score is 5.3, reflecting medium severity due to the ease of remote exploitation but limited scope of impact and partial confidentiality, integrity, and availability impact. The vulnerability does not require user interaction or privileges but does require network access to the vulnerable CGI interface. The lack of available patches or official mitigation guidance increases the urgency for users to implement alternative protective measures.

Potential Impact

The impact of CVE-2026-4197 on organizations worldwide can be significant, especially for those relying on affected D-Link NAS devices for critical data storage and sharing. Successful exploitation can lead to unauthorized command execution, which may compromise the confidentiality of sensitive data stored on the NAS, alter or delete files (impacting integrity), or disrupt NAS functionality (affecting availability). This could result in data breaches, operational downtime, and potential lateral movement within networks if attackers use compromised NAS devices as footholds. Given the remote and unauthenticated nature of the exploit, attackers can target exposed NAS devices over the internet or internal networks without needing credentials. Organizations in sectors such as small and medium enterprises, education, healthcare, and government agencies that commonly deploy these NAS models are particularly at risk. The public availability of exploit code increases the likelihood of opportunistic attacks. While no widespread exploitation is currently reported, the vulnerability could be leveraged in targeted attacks or ransomware campaigns. The medium severity score suggests a moderate but tangible risk that requires timely mitigation to prevent escalation.

Mitigation Recommendations

To mitigate CVE-2026-4197 effectively, organizations should take the following specific actions: 1) Immediately restrict network access to the /cgi-bin/download_mgr.cgi interface by implementing firewall rules or network segmentation to limit exposure to trusted management networks only. 2) Disable RSS feed update and download features on affected devices if they are not essential to operations, thereby removing the vulnerable attack surface. 3) Monitor network traffic and device logs for unusual commands or access patterns targeting the download_mgr.cgi endpoint. 4) Apply any available firmware updates or patches from D-Link as soon as they are released; if no official patch exists, contact D-Link support for guidance or consider device replacement. 5) Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting known exploit patterns for this vulnerability. 6) Conduct regular security assessments of NAS devices to identify and remediate configuration weaknesses. 7) Educate IT staff on the risks of exposing management interfaces to untrusted networks and enforce strong network access controls. These measures go beyond generic advice by focusing on reducing attack surface, proactive monitoring, and compensating controls until official patches are available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-15T08:22:57.970Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b745e29d4df451838ed4be

Added to database: 3/15/2026, 11:50:58 PM

Last enriched: 3/16/2026, 12:05:35 AM

Last updated: 3/16/2026, 5:45:47 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses