Vulnerability Description
A vulnerability was found in D-Link DCS-931L up to 1.13.0. Impacted is the function doSystem of the file /setSystemAdmin. Performing a manipulation of the argument AdminID results in command injection. The attack may be initiated remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dcs-931L Firmware | <= 1.13.00 |
| Dlink | Dcs-931L | - |
Related Weaknesses (CWE)
References
- https://github.com/cha0yang1/CVE/blob/main/D-Link%20DCS931L1.mdExploitThird Party Advisory
- https://vuldb.com/?ctiid.344944Permissions RequiredVDB Entry
- https://vuldb.com/?id.344944Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.753450Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.753980
- https://www.dlink.com/Product
FAQ
What is CVE-2026-2227?
CVE-2026-2227 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A vulnerability was found in D-Link DCS-931L up to 1.13.0. Impacted is the function doSystem of the file /setSystemAdmin. Performing a manipulation of the argument AdminID results in command injection...
How severe is CVE-2026-2227?
CVE-2026-2227 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-2227?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dcs-931L Firmware, Dlink Dcs-931L.