Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 11 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink dns-320 Dlink dns-320 Firmware |
|
| CPEs | cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dns-320_firmware:2.06b01:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dlink
Dlink dns-320 Dlink dns-320 Firmware |
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D-link
D-link dns-320 |
|
| Vendors & Products |
D-link
D-link dns-320 |
Mon, 11 May 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in D-Link DNS-320 2.06B01. The impacted element is the function cgi_speed/cgi_dhcpd_lease/cgi_ddns/cgi_set_ip/cgi_upnp_del/cgi_dhcpd/cgi_upnp_add/cgi_upnp_edit of the file /cgi-bin/network_mgr.cgi. The manipulation leads to os command injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. | |
| Title | D-Link DNS-320 network_mgr.cgi cgi_upnp_edit os command injection | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-11T10:19:22.797Z
Reserved: 2026-05-10T15:53:48.161Z
Link: CVE-2026-8271
Updated: 2026-05-11T10:19:04.265Z
Status : Analyzed
Published: 2026-05-11T05:16:16.093
Modified: 2026-05-11T20:33:29.837
Link: CVE-2026-8271
No data.
OpenCVE Enrichment
Updated: 2026-05-11T06:30:29Z