CVE-2026-3485

CRITICAL
2026-03-03 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 12, 2026 - 22:05 vuln.today
PoC Detected
Mar 04, 2026 - 14:07 vuln.today
Public exploit code
CVE Published
Mar 03, 2026 - 21:16 nvd
CRITICAL 9.8

Description

A flaw has been found in D-Link DIR-868L 110b03. This affects the function sub_1BF84 of the component SSDP Service. This manipulation of the argument ST causes os command injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Analysis

Command injection in D-Link DIR-868L via SSDP service. PoC available.

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify and inventory all D-Link DIR-868L devices in your environment and isolate affected units from production networks if operationally feasible. Within 7 days: Implement network segmentation to restrict SSDP traffic (UDP port 1900) and disable UPnP/SSDP on affected devices if business operations permit. …

Sign in for detailed remediation steps.

Priority Score

69
Low Medium High Critical
KEV: 0
EPSS: +0.4
CVSS: +49
POC: +20

Share

CVE-2026-3485 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy