Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4210: Command Injection in D-Link DNS-120

0
Medium
VulnerabilityCVE-2026-4210cvecve-2026-4210
Published: Mon Mar 16 2026 (03/16/2026, 03:02:16 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DNS-120

Description

A security flaw has been discovered in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected by this vulnerability is the function cgi_tm_set_share of the file /cgi-bin/time_machine.cgi. The manipulation of the argument Name results in command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.

AI-Powered Analysis

AILast updated: 03/16/2026, 04:05:39 UTC

Technical Analysis

CVE-2026-4210 is a remote command injection vulnerability discovered in a broad range of D-Link NAS devices, including DNS-120, DNS-315L, DNS-320 series, DNS-323, DNS-325, DNS-326, DNS-327L, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05, and DNS-1550-04, specifically affecting firmware versions up to 20260205. The flaw exists in the cgi_tm_set_share function within the /cgi-bin/time_machine.cgi endpoint, where the 'Name' argument is not properly sanitized, allowing an attacker to inject arbitrary OS commands. This vulnerability can be exploited remotely without authentication or user interaction, making it accessible to unauthenticated attackers over the network. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L, indicating low privileges but some level of access), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The exploit code has been publicly released, increasing the likelihood of exploitation, although no active exploitation has been reported yet. The vulnerability affects the underlying operating system of the NAS devices, potentially allowing attackers to execute arbitrary commands, leading to unauthorized access, data leakage, or disruption of services. The absence of available patches or official vendor advisories at this time increases the urgency for organizations to implement mitigations and monitor for suspicious activity.

Potential Impact

The vulnerability allows remote attackers to execute arbitrary commands on affected D-Link NAS devices without authentication, posing a significant risk to confidentiality, integrity, and availability. Successful exploitation could lead to unauthorized data access or exfiltration, modification or deletion of stored data, and disruption of NAS services critical for business operations. Given the NAS devices' role in centralized storage and backup, compromise could impact multiple users or systems relying on these devices. The public availability of exploit code increases the risk of widespread attacks, especially targeting organizations that have not applied mitigations. While the CVSS score rates the severity as medium, the real-world impact could be higher depending on the sensitivity of the data stored and the network environment. Organizations using these devices in enterprise or critical infrastructure environments face elevated risks of data breaches, ransomware deployment, or persistent unauthorized access.

Mitigation Recommendations

1. Immediately isolate affected D-Link NAS devices from untrusted networks to prevent remote exploitation. 2. Monitor network traffic and device logs for unusual or unauthorized access attempts targeting /cgi-bin/time_machine.cgi or suspicious command execution patterns. 3. Implement network-level access controls such as firewall rules to restrict access to NAS management interfaces to trusted IP addresses only. 4. Disable or restrict the use of the vulnerable CGI endpoint if possible, or disable remote management features until a vendor patch is available. 5. Regularly check for vendor advisories and apply firmware updates or patches as soon as they are released. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for known exploit attempts targeting this vulnerability. 7. Conduct thorough audits of NAS device configurations and user permissions to minimize exposure. 8. Consider network segmentation to limit the impact of a compromised NAS device. 9. Educate IT staff about this vulnerability and ensure incident response plans include procedures for NAS device compromise. 10. If feasible, replace affected devices with models not impacted by this vulnerability or from vendors with timely security support.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-15T11:58:18.779Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b77e229d4df45183f020c4

Added to database: 3/16/2026, 3:50:58 AM

Last enriched: 3/16/2026, 4:05:39 AM

Last updated: 3/16/2026, 10:00:41 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses