Description
A security flaw has been discovered in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected by this vulnerability is the function cgi_tm_set_share of the file /cgi-bin/time_machine.cgi. The manipulation of the argument Name results in command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.
CVSS Metrics
- Vector
- CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Attack Vector
- network
- Complexity
- low
- Privileges
- low
- User Action
- none
- Confidentiality
- undefined
- Integrity
- undefined
- Availability
- undefined
- Weaknesses
- CWE-74CWE-77CWE-77
Metadata
- Primary Vendor
- DLINK
- Published
- 3/16/2026
- Last Modified
- 3/19/2026
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
dlink : dnr-202l_firmwaredlink : dnr-326_firmwaredlink : dns-1100-4_firmwaredlink : dns-120_firmwaredlink : dns-1200-05_firmwaredlink : dns-1550-04_firmwaredlink : dns-315l_firmwaredlink : dns-320_firmwaredlink : dns-320l_firmwaredlink : dns-320lw_firmwaredlink : dns-321_firmwaredlink : dns-322l_firmwaredlink : dns-323_firmwaredlink : dns-325_firmwaredlink : dns-326_firmwaredlink : dns-327l_firmwaredlink : dns-340l_firmwaredlink : dns-343_firmwaredlink : dns-345_firmwaredlink : dns-726-4_firmware
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.