Vulnerability Description
A security flaw has been discovered in D-Link DNS-320 2.06B01. This affects the function delete/rename/copy/move/chmod/chown of the file /cgi-bin/webfile_mgr.cgi. The manipulation results in os command injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dns-320 Firmware | 2.06b01 |
| Dlink | Dns-320 | - |
Related Weaknesses (CWE)
References
- https://github.com/dxz0069/WAVLINK-WN530H4-Command-Injection-in-set_add_routing/ExploitThird Party Advisory
- https://vuldb.com/submit/810079Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/362569Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/362569/ctiPermissions RequiredVDB Entry
- https://www.dlink.com/Product
FAQ
What is CVE-2026-8272?
CVE-2026-8272 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A security flaw has been discovered in D-Link DNS-320 2.06B01. This affects the function delete/rename/copy/move/chmod/chown of the file /cgi-bin/webfile_mgr.cgi. The manipulation results in os comman...
How severe is CVE-2026-8272?
CVE-2026-8272 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8272?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dns-320 Firmware, Dlink Dns-320.