Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink dns-320 Dlink dns-320 Firmware |
|
| CPEs | cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dns-320_firmware:2.06b01:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dlink
Dlink dns-320 Dlink dns-320 Firmware |
Mon, 11 May 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D-link
D-link dns-320 |
|
| Vendors & Products |
D-link
D-link dns-320 |
Mon, 11 May 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in D-Link DNS-320 2.06B01. This affects the function delete/rename/copy/move/chmod/chown of the file /cgi-bin/webfile_mgr.cgi. The manipulation results in os command injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. | |
| Title | D-Link DNS-320 webfile_mgr.cgi chown os command injection | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-12T13:42:32.061Z
Reserved: 2026-05-10T15:53:56.029Z
Link: CVE-2026-8272
Updated: 2026-05-12T13:42:25.850Z
Status : Analyzed
Published: 2026-05-11T05:16:16.253
Modified: 2026-05-11T20:32:28.223
Link: CVE-2026-8272
No data.
OpenCVE Enrichment
Updated: 2026-05-11T07:00:12Z