No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D-link
D-link dns-320 |
|
| Vendors & Products |
D-link
D-link dns-320 |
Mon, 11 May 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in D-Link DNS-320 2.06B01. The impacted element is the function cgi_speed/cgi_dhcpd_lease/cgi_ddns/cgi_set_ip/cgi_upnp_del/cgi_dhcpd/cgi_upnp_add/cgi_upnp_edit of the file /cgi-bin/network_mgr.cgi. The manipulation leads to os command injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. | |
| Title | D-Link DNS-320 network_mgr.cgi cgi_upnp_edit os command injection | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-11T04:00:11.457Z
Reserved: 2026-05-10T15:53:48.161Z
Link: CVE-2026-8271
No data.
Status : Received
Published: 2026-05-11T05:16:16.093
Modified: 2026-05-11T05:16:16.093
Link: CVE-2026-8271
No data.
OpenCVE Enrichment
Updated: 2026-05-11T06:30:29Z