Dns 315l

11 CVEs product

Monthly

CVE-2026-4214 HIGH POC This Week

Stack-based buffer overflow in D-Link NAS devices (DNS-120, DNR-202L, DNS-315L, DNS-320 series, DNS-326, DNS-1100-4, and others) through the UPnP_AV_Server_Path_Setting function in /cgi-bin/app_mgr.cgi allows authenticated remote attackers to achieve complete system compromise with high integrity, confidentiality, and availability impact. Public exploit code exists for this vulnerability, and no patch is currently available.

Buffer Overflow D-Link Stack Overflow Dns 320lw Dns 323 +18
NVD VulDB GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-4213 HIGH POC This Week

Stack-based buffer overflow in D-Link DNS storage appliances (DNS-120, DNS-340L, DNS-1200-05 and others) through the /cgi-bin/gui_mgr.cgi endpoint allows remote authenticated attackers to achieve code execution. Public exploit code exists for this vulnerability, and no patch is currently available. Affected firmware versions are dated up to February 5, 2026.

Stack Overflow Buffer Overflow D-Link Dns 120 Dns 340l +18
NVD VulDB GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-4212 HIGH POC This Week

Stack-based buffer overflow in D-Link DNS NAS devices (DNS-120 through DNS-1550-04) allows authenticated attackers to achieve remote code execution via the Downloads_Schedule_Info function in /cgi-bin/download_mgr.cgi. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires valid credentials but can be executed over the network with high impact on confidentiality, integrity, and availability.

D-Link Buffer Overflow Stack Overflow Dns 1550 04 Dns 343 +18
NVD VulDB GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-4211 HIGH POC This Week

Stack-based buffer overflow in D-Link DNS and DNR network storage devices allows authenticated remote attackers to execute arbitrary code by manipulating the f_idx parameter in the local_backup_mgr.cgi endpoint. Public exploit code exists for this vulnerability, which affects multiple device models up to firmware version 20260205 with no patch currently available. An attacker with valid credentials can trigger memory corruption to achieve complete system compromise including code execution, data theft, and service disruption.

D-Link Buffer Overflow Stack Overflow Dns 315l Dns 120 +18
NVD VulDB GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-4210 MEDIUM POC This Month

Command injection in D-Link NAS devices (DNS-320, DNS-327L, DNS-345 and others) through the time_machine.cgi script allows authenticated remote attackers to execute arbitrary commands with network access. Public exploit code exists for this vulnerability, and no patch is currently available.

D-Link Command Injection RCE Dns 320 Dns 345 +18
NVD VulDB GitHub
CVSS 3.1
6.3
EPSS
0.5%
CVE-2026-4209 MEDIUM POC This Month

Command injection in D-Link NAS devices (DNS-120, DNS-325, DNR-322L, DNS-327L and others) allows authenticated remote attackers to execute arbitrary commands through multiple user and group management CGI functions. Public exploit code exists for this vulnerability, and patches are not currently available. An attacker with valid credentials could leverage this to compromise the NAS system and potentially access or manipulate stored data.

D-Link Command Injection RCE Dns 325 Dnr 322l +18
NVD VulDB GitHub
CVSS 3.1
6.3
EPSS
0.4%
CVE-2026-4207 MEDIUM POC This Month

Command injection in D-Link NAS devices (DNS-320, DNS-325, DNS-343, DNR-322L and others) through the /cgi-bin/system_mgr.cgi interface allows authenticated remote attackers to execute arbitrary commands. Public exploit code exists for this vulnerability, and no patch is currently available.

D-Link Command Injection RCE Dnr 322l Dns 325 +18
NVD VulDB GitHub
CVSS 3.1
6.3
EPSS
0.4%
CVE-2026-4206 MEDIUM POC This Month

A security vulnerability in A vulnerability (CVSS 6.3). Risk factors: public PoC available.

D-Link Command Injection RCE Dns 315l Dns 325 +18
NVD VulDB GitHub
CVSS 3.1
6.3
EPSS
0.4%
CVE-2026-4205 MEDIUM POC This Month

A security vulnerability in A vulnerability (CVSS 6.3). Risk factors: public PoC available.

Command Injection D-Link RCE Ftp Dns 320 +19
NVD VulDB GitHub
CVSS 3.1
6.3
EPSS
0.4%
CVE-2026-4204 MEDIUM POC This Month

A security vulnerability in A flaw (CVSS 6.3). Risk factors: public PoC available.

Command Injection D-Link RCE Dns 726 4 Dns 323 +18
NVD VulDB GitHub
CVSS 3.1
6.3
EPSS
0.5%
CVE-2026-4203 MEDIUM POC This Month

Command injection in D-Link DNS and DNR network attached storage devices allows authenticated remote attackers to execute arbitrary commands through multiple CGI functions in the network management interface. The vulnerability affects numerous models up to firmware version 20260205, and public exploit code is available. An attacker with valid credentials can leverage this to compromise device integrity and potentially access the network.

Command Injection D-Link RCE Dhcp Dns +20
NVD VulDB GitHub
CVSS 3.1
6.3
EPSS
0.4%
CVE-2026-4214
EPSS 0% CVSS 8.8
HIGH POC This Week

Stack-based buffer overflow in D-Link NAS devices (DNS-120, DNR-202L, DNS-315L, DNS-320 series, DNS-326, DNS-1100-4, and others) through the UPnP_AV_Server_Path_Setting function in /cgi-bin/app_mgr.cgi allows authenticated remote attackers to achieve complete system compromise with high integrity, confidentiality, and availability impact. Public exploit code exists for this vulnerability, and no patch is currently available.

Buffer Overflow D-Link Stack Overflow +20
NVD VulDB GitHub
CVE-2026-4213
EPSS 0% CVSS 8.8
HIGH POC This Week

Stack-based buffer overflow in D-Link DNS storage appliances (DNS-120, DNS-340L, DNS-1200-05 and others) through the /cgi-bin/gui_mgr.cgi endpoint allows remote authenticated attackers to achieve code execution. Public exploit code exists for this vulnerability, and no patch is currently available. Affected firmware versions are dated up to February 5, 2026.

Stack Overflow Buffer Overflow D-Link +20
NVD VulDB GitHub
CVE-2026-4212
EPSS 0% CVSS 8.8
HIGH POC This Week

Stack-based buffer overflow in D-Link DNS NAS devices (DNS-120 through DNS-1550-04) allows authenticated attackers to achieve remote code execution via the Downloads_Schedule_Info function in /cgi-bin/download_mgr.cgi. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires valid credentials but can be executed over the network with high impact on confidentiality, integrity, and availability.

D-Link Buffer Overflow Stack Overflow +20
NVD VulDB GitHub
CVE-2026-4211
EPSS 0% CVSS 8.8
HIGH POC This Week

Stack-based buffer overflow in D-Link DNS and DNR network storage devices allows authenticated remote attackers to execute arbitrary code by manipulating the f_idx parameter in the local_backup_mgr.cgi endpoint. Public exploit code exists for this vulnerability, which affects multiple device models up to firmware version 20260205 with no patch currently available. An attacker with valid credentials can trigger memory corruption to achieve complete system compromise including code execution, data theft, and service disruption.

D-Link Buffer Overflow Stack Overflow +20
NVD VulDB GitHub
CVE-2026-4210
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Command injection in D-Link NAS devices (DNS-320, DNS-327L, DNS-345 and others) through the time_machine.cgi script allows authenticated remote attackers to execute arbitrary commands with network access. Public exploit code exists for this vulnerability, and no patch is currently available.

D-Link Command Injection RCE +20
NVD VulDB GitHub
CVE-2026-4209
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Command injection in D-Link NAS devices (DNS-120, DNS-325, DNR-322L, DNS-327L and others) allows authenticated remote attackers to execute arbitrary commands through multiple user and group management CGI functions. Public exploit code exists for this vulnerability, and patches are not currently available. An attacker with valid credentials could leverage this to compromise the NAS system and potentially access or manipulate stored data.

D-Link Command Injection RCE +20
NVD VulDB GitHub
CVE-2026-4207
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Command injection in D-Link NAS devices (DNS-320, DNS-325, DNS-343, DNR-322L and others) through the /cgi-bin/system_mgr.cgi interface allows authenticated remote attackers to execute arbitrary commands. Public exploit code exists for this vulnerability, and no patch is currently available.

D-Link Command Injection RCE +20
NVD VulDB GitHub
CVE-2026-4206
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A security vulnerability in A vulnerability (CVSS 6.3). Risk factors: public PoC available.

D-Link Command Injection RCE +20
NVD VulDB GitHub
CVE-2026-4205
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A security vulnerability in A vulnerability (CVSS 6.3). Risk factors: public PoC available.

Command Injection D-Link RCE +21
NVD VulDB GitHub
CVE-2026-4204
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A security vulnerability in A flaw (CVSS 6.3). Risk factors: public PoC available.

Command Injection D-Link RCE +20
NVD VulDB GitHub
CVE-2026-4203
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Command injection in D-Link DNS and DNR network attached storage devices allows authenticated remote attackers to execute arbitrary commands through multiple CGI functions in the network management interface. The vulnerability affects numerous models up to firmware version 20260205, and public exploit code is available. An attacker with valid credentials can leverage this to compromise device integrity and potentially access the network.

Command Injection D-Link RCE +22
NVD VulDB GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy