LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-8273 - Vulnerability Analysis

MediumCVSS: 4.7

Last Updated: May 11, 2026

D-Link DNS-320 - Command Injection

Published: May 11, 2026Updated: May 11, 2026PoC AvailableRemote Exploitable

Overview

D-Link DNS-320 2.06B01 contains a command injection caused by manipulation of cgi_set_host/cgi_set_ntp/cgi_fan_control/cgi_merge_user functions in /cgi-bin/system_mgr.cgi, letting remote attackers execute OS commands, exploit requires network access.

Severity & Score

Severity: Medium
CVSS Score: 4.7

Impact

Remote attackers can execute arbitrary OS commands, potentially leading to full system compromise.

Mitigation

Update to the latest firmware version available from D-Link.

Details

CVE ID
CVE-2026-8273
Severity
Medium
CVSS Score
4.7
Type
command_injection
Status
confirmed

CWE

  • CWE-77
  • CWE-78

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L