HIGHVulnerability
Verified
Global

NVD HIGH: CVE-2026-8271 — A vulnerability was identified in D-Link DNS-320 2.06B01. The impacted element i...

·Source: NIST NVD

Updated:

Executive Summary

A vulnerability was identified in D-Link DNS-320 2.06B01. The impacted element is the function cgi_speed/cgi_dhcpd_lease/cgi_ddns/cgi_set_ip/cgi_upnp_del/cgi_dhcpd/cgi_upnp_add/cgi_upnp_edit of the file /cgi-bin/network_mgr.cgi. The manipulation leads to os command injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

Analysis

A vulnerability was identified in D-Link DNS-320 2.06B01. The impacted element is the function cgi_speed/cgi_dhcpd_lease/cgi_ddns/cgi_set_ip/cgi_upnp_del/cgi_dhcpd/cgi_upnp_add/cgi_upnp_edit of the file /cgi-bin/network_mgr.cgi. The manipulation leads to os command injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. CVSS Score: 4.7. Published: 2026-05-11T05:16:16.093.

Indicators of Compromise (1)

CVE (1)
CVE-2026-8271
Source Attribution

Originally published by NIST NVD on May 11, 2026. Verified by: NIST.

Related Threats