D-Link DNS-320 2.06B01 OS Command Injection via /cgi-bin/system_mgr.cgi
CVE-2026-8273 Published on May 11, 2026

D-Link DNS-320 system_mgr.cgi cgi_merge_user os command injection
A weakness has been identified in D-Link DNS-320 2.06B01. This impacts the function cgi_set_host/cgi_set_ntp/cgi_fan_control/cgi_merge_user of the file /cgi-bin/system_mgr.cgi. This manipulation causes os command injection. It is possible to initiate the attack remotely.

NVD

Timeline

Advisory disclosed

VulDB entry created

VulDB entry last update

Weakness Types

What is a Shell injection Vulnerability?

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE-2026-8273 has been classified to as a Shell injection vulnerability or weakness.

What is a Command Injection Vulnerability?

The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

CVE-2026-8273 has been classified to as a Command Injection vulnerability or weakness.


Affected Versions

D-Link DNS-320 Version 2.06B01 is affected by CVE-2026-8273