Command Injection in D-Link DNS Products
CVE-2026-4196
Key Information:
Badges
What is CVE-2026-4196?
A command injection vulnerability has been identified in various D-Link DNS products. This flaw resides in the cgi_recovery, cgi_backup_now, cgi_set_schedule, and cgi_set_rsync_server functions of the /cgi-bin/remote_backup.cgi file. Remote attackers can exploit this vulnerability to execute arbitrary commands, potentially compromising the affected systems. It is crucial for D-Link users to remain vigilant and apply necessary updates to mitigate the risk associated with this vulnerability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
DNR-202L 20260205
DNR-322L 20260205
DNR-326 20260205
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved