Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4204: Command Injection in D-Link DNS-120

0
Medium
VulnerabilityCVE-2026-4204cvecve-2026-4204
Published: Mon Mar 16 2026 (03/16/2026, 01:02:15 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DNS-120

Description

CVE-2026-4204 is a command injection vulnerability affecting multiple D-Link NAS devices, including the DNS-120 and several other models. The flaw exists in the /cgi-bin/gui_mgr. cgi file, specifically in functions handling the f_user argument, allowing remote attackers to execute arbitrary commands without authentication or user interaction. The vulnerability has a CVSS 4. 0 score of 5. 3, indicating medium severity. Exploitation requires no user interaction but does require low privileges, and the attack surface is network-exposed. Although no known exploits are currently observed in the wild, a public exploit has been published, increasing the risk of exploitation. The vulnerability impacts confidentiality, integrity, and availability of affected devices, potentially allowing attackers to take full control. Organizations using these D-Link NAS devices should prioritize patching or mitigating this flaw to prevent unauthorized remote command execution.

AI-Powered Analysis

AILast updated: 03/16/2026, 02:05:28 UTC

Technical Analysis

CVE-2026-4204 is a command injection vulnerability identified in multiple D-Link NAS devices, including DNS-120, DNS-315L, DNS-320 series, DNS-323, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05, and DNS-1550-04, all up to firmware version 20260205. The vulnerability resides in the CGI script /cgi-bin/gui_mgr.cgi, specifically within several functions such as cgi_myfavorite_add, cgi_myfavorite_set, cgi_myfavorite_del, and others that handle the f_user parameter. Improper sanitization or validation of this parameter allows an attacker to inject arbitrary OS commands, which the device executes with the privileges of the web server process. This flaw can be exploited remotely over the network without requiring user interaction, although it requires low-level privileges (likely authenticated or with some access). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and impacts on confidentiality, integrity, and availability, but with limited scope and impact severity. The exploit code has been publicly disclosed, increasing the likelihood of exploitation attempts. The vulnerability affects the core management interface of these devices, potentially allowing attackers to compromise device functionality, access stored data, disrupt services, or pivot into internal networks. No official patches or mitigation links are provided in the data, suggesting that affected organizations must seek vendor updates or apply workarounds. Given the widespread use of these D-Link NAS devices in small to medium enterprises and home environments, the vulnerability poses a significant risk if left unaddressed.

Potential Impact

The impact of CVE-2026-4204 is substantial for organizations relying on affected D-Link NAS devices for data storage and network services. Successful exploitation allows remote attackers to execute arbitrary commands on the device, potentially leading to full device compromise. This can result in unauthorized access to sensitive data stored on the NAS, disruption or destruction of stored files, and the ability to use the compromised device as a foothold for lateral movement within internal networks. The integrity and availability of critical data and services hosted on these devices can be severely affected. Since the vulnerability requires no user interaction and can be exploited remotely, it increases the risk of automated attacks and worm-like propagation. Organizations without timely mitigation may face data breaches, operational downtime, and increased exposure to ransomware or other malware attacks. The lack of patches or official mitigation guidance further exacerbates the risk, making proactive defense essential.

Mitigation Recommendations

1. Immediately isolate affected D-Link NAS devices from untrusted networks to reduce exposure. 2. Monitor network traffic for suspicious requests targeting /cgi-bin/gui_mgr.cgi and the vulnerable functions, especially those manipulating the f_user parameter. 3. Implement network-level access controls such as firewall rules or VPN-only access to restrict management interface exposure. 4. Disable or restrict access to the vulnerable CGI functions if possible via device configuration or custom firmware modifications. 5. Regularly check for and apply official firmware updates or patches from D-Link addressing this vulnerability. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for known exploit attempts targeting this vulnerability. 7. Conduct thorough audits of NAS device logs for signs of compromise or unauthorized command execution. 8. Where feasible, replace outdated or unsupported devices with newer models that have improved security controls. 9. Educate IT staff about the vulnerability and ensure rapid incident response procedures are in place. 10. Consider network segmentation to limit the impact of a compromised NAS device on critical infrastructure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-15T11:35:22.425Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b762029d4df45183c8a8e6

Added to database: 3/16/2026, 1:50:58 AM

Last enriched: 3/16/2026, 2:05:28 AM

Last updated: 3/16/2026, 6:30:38 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses