D-Link DNS-1550-04 time_machine.cgi cgi_tm_set_share command injection
Summary
| CVE | CVE-2026-4210 |
|---|---|
| State | PUBLISHED |
| Assigner | VulDB |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-16 14:20:07 UTC |
| Updated | 2026-04-29 01:00:01 UTC |
| Description | A security flaw has been discovered in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected by this vulnerability is the function cgi_tm_set_share of the file /cgi-bin/time_machine.cgi. The manipulation of the argument Name results in command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. |
Risk And Classification
Primary CVSS: v4.0 2.1 LOW from [email protected]
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Problem Types: CWE-74 | CWE-77 | CWE-77 Command Injection | CWE-74 Injection
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 4.0 | [email protected] | Secondary | 2.1 | LOW | CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/C... |
| 4.0 | CNA | DECLARED | 5.3 | MEDIUM | CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P |
| 3.1 | [email protected] | Primary | 9.8 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | [email protected] | Secondary | 6.3 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
| 3.1 | CNA | DECLARED | 6.3 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R |
| 3.0 | CNA | DECLARED | 6.3 | MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R |
| 2.0 | [email protected] | Secondary | 6.5 | AV:N/AC:L/Au:S/C:P/I:P/A:P | |
| 2.0 | CNA | DECLARED | 6.5 | AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR |
CVSS v4.0 Breakdown
Attack Vector
NetworkAttack Complexity
LowAttack Requirements
NonePrivileges Required
LowUser Interaction
NoneConfidentiality
LowIntegrity
LowAvailability
LowSub Conf.
NoneSub Integrity
NoneSub Availability
NoneCVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v3.0 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
LowIntegrity
LowAvailability
LowCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Dlink | Dnr-202l | - | All | All | All |
| Operating System | Dlink | Dnr-202l Firmware | All | All | All | All |
| Hardware | Dlink | Dnr-326 | - | All | All | All |
| Operating System | Dlink | Dnr-326 Firmware | All | All | All | All |
| Hardware | Dlink | Dns-1100-4 | - | All | All | All |
| Operating System | Dlink | Dns-1100-4 Firmware | All | All | All | All |
| Hardware | Dlink | Dns-120 | - | All | All | All |
| Hardware | Dlink | Dns-1200-05 | - | All | All | All |
| Operating System | Dlink | Dns-1200-05 Firmware | All | All | All | All |
| Operating System | Dlink | Dns-120 Firmware | All | All | All | All |
| Hardware | Dlink | Dns-1550-04 | - | All | All | All |
| Operating System | Dlink | Dns-1550-04 Firmware | All | All | All | All |
| Hardware | Dlink | Dns-315l | - | All | All | All |
| Operating System | Dlink | Dns-315l Firmware | All | All | All | All |
| Hardware | Dlink | Dns-320 | - | All | All | All |
| Hardware | Dlink | Dns-320l | - | All | All | All |
| Hardware | Dlink | Dns-320lw | - | All | All | All |
| Operating System | Dlink | Dns-320lw Firmware | All | All | All | All |
| Operating System | Dlink | Dns-320l Firmware | All | All | All | All |
| Operating System | Dlink | Dns-320 Firmware | All | All | All | All |
| Hardware | Dlink | Dns-321 | - | All | All | All |
| Operating System | Dlink | Dns-321 Firmware | All | All | All | All |
| Hardware | Dlink | Dns-322l | - | All | All | All |
| Operating System | Dlink | Dns-322l Firmware | All | All | All | All |
| Hardware | Dlink | Dns-323 | - | All | All | All |
| Operating System | Dlink | Dns-323 Firmware | All | All | All | All |
| Hardware | Dlink | Dns-325 | - | All | All | All |
| Operating System | Dlink | Dns-325 Firmware | All | All | All | All |
| Hardware | Dlink | Dns-326 | - | All | All | All |
| Operating System | Dlink | Dns-326 Firmware | All | All | All | All |
| Hardware | Dlink | Dns-327l | - | All | All | All |
| Operating System | Dlink | Dns-327l Firmware | All | All | All | All |
| Hardware | Dlink | Dns-340l | - | All | All | All |
| Operating System | Dlink | Dns-340l Firmware | All | All | All | All |
| Hardware | Dlink | Dns-343 | - | All | All | All |
| Operating System | Dlink | Dns-343 Firmware | All | All | All | All |
| Hardware | Dlink | Dns-345 | - | All | All | All |
| Operating System | Dlink | Dns-345 Firmware | All | All | All | All |
| Hardware | Dlink | Dns-726-4 | - | All | All | All |
| Operating System | Dlink | Dns-726-4 Firmware | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | D-Link | DNS-120 | affected 20260205 | Not specified |
| CNA | D-Link | DNR-202L | affected 20260205 | Not specified |
| CNA | D-Link | DNS-315L | affected 20260205 | Not specified |
| CNA | D-Link | DNS-320 | affected 20260205 | Not specified |
| CNA | D-Link | DNS-320L | affected 20260205 | Not specified |
| CNA | D-Link | DNS-320LW | affected 20260205 | Not specified |
| CNA | D-Link | DNS-321 | affected 20260205 | Not specified |
| CNA | D-Link | DNR-322L | affected 20260205 | Not specified |
| CNA | D-Link | DNS-323 | affected 20260205 | Not specified |
| CNA | D-Link | DNS-325 | affected 20260205 | Not specified |
| CNA | D-Link | DNS-326 | affected 20260205 | Not specified |
| CNA | D-Link | DNS-327L | affected 20260205 | Not specified |
| CNA | D-Link | DNR-326 | affected 20260205 | Not specified |
| CNA | D-Link | DNS-340L | affected 20260205 | Not specified |
| CNA | D-Link | DNS-343 | affected 20260205 | Not specified |
| CNA | D-Link | DNS-345 | affected 20260205 | Not specified |
| CNA | D-Link | DNS-726-4 | affected 20260205 | Not specified |
| CNA | D-Link | DNS-1100-4 | affected 20260205 | Not specified |
| CNA | D-Link | DNS-1200-05 | affected 20260205 | Not specified |
| CNA | D-Link | DNS-1550-04 | affected 20260205 | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_159/159.md | [email protected] | github.com | Exploit, Third Party Advisory |
| www.dlink.com | [email protected] | www.dlink.com | Product |
| vuldb.com | [email protected] | vuldb.com | Permissions Required, VDB Entry |
| vuldb.com | [email protected] | vuldb.com | Third Party Advisory, VDB Entry |
| vuldb.com | [email protected] | vuldb.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: pjqwudi (VulDB User) (en)
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2026-03-15T00:00:00.000Z | Advisory disclosed |
| CNA | 2026-03-15T01:00:00.000Z | VulDB entry created |
| CNA | 2026-03-15T13:03:22.000Z | VulDB entry last update |
There are currently no legacy QID mappings associated with this CVE.