Description

A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The impacted element is the function cgi_set_wto of the file /cgi-bin/system_mgr.cgi. Performing a manipulation results in improper access controls. Remote exploitation of the attack is possible. The exploit is now public and may be used.

INFO

Published Date :

2026-03-15T23:02:14.929Z

Last Modified :

2026-03-16T14:40:35.694Z

Source :

VulDB
AFFECTED PRODUCTS

The following products are affected by CVE-2026-4194 vulnerability.

Vendors Products
D-link
  • Dnr-202l
  • Dnr-322l
  • Dnr-326
  • Dns-1100-4
  • Dns-120
  • Dns-1200-05
  • Dns-1550-04
  • Dns-315l
  • Dns-320
  • Dns-320l
  • Dns-320lw
  • Dns-321
  • Dns-323
  • Dns-325
  • Dns-326
  • Dns-327l
  • Dns-340l
  • Dns-343
  • Dns-345
  • Dns-726-4
REFERENCES

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Detailed values of each vector for above chart.
Access Vector
Access Complexity
Authentication
Confidentiality Impact
Integrity Impact
Availability Impact