Improper Access Control in D-Link NAS Devices
CVE-2026-5311
6.9MEDIUM
Key Information:
Badges
๐พ Exploit Exists๐ก Public PoC
What is CVE-2026-5311?
A vulnerability has been identified in various D-Link NAS devices that allows attackers to manipulate the argument 'cmd' within the WebDAV access list functionality of the /cgi-bin/file_center.cgi file. This flaw results in improper access controls, potentially enabling unauthorized remote access. The exploit has already been publicly disclosed, posing a significant risk to users of affected products.
Affected Version(s)
DNR-202L 20260205
DNR-322L 20260205
DNR-326 20260205
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Ziyue Xie (VulDB User)