CVE-2026-5312

MEDIUM

D-Link DNS-1550-04 dsk_mgr.cgi Get_current_raidtype access control

Title source: cna

Description

A weakness has been identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected by this vulnerability is the function FMT_restart/Status_HDInfo/SMART_List/ScanDisk_info/ScanDisk/volume_status/Get_Volume_Mapping/FMT_check_disk_remount_state/FMT_rebuildinfo/FMT_result_list/FMT_result_list_phy/FMT_get_dminfo/FMT_manually_rebuild_info/Get_current_raidtype of the file /cgi-bin/dsk_mgr.cgi. Executing a manipulation can lead to improper access controls. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.

Scores

CVSS v3 5.3
EPSS 0.0009
EPSS Percentile 25.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Details

CWE
CWE-266 CWE-284
Status published
Products (40)
D-Link/DNR-202L 20260205
D-Link/DNR-322L 20260205
D-Link/DNR-326 20260205
D-Link/DNS-1100-4 20260205
D-Link/DNS-120 20260205
D-Link/DNS-1200-05 20260205
D-Link/DNS-1550-04 20260205
D-Link/DNS-315L 20260205
D-Link/DNS-320 20260205
D-Link/DNS-320L 20260205
... and 30 more
Published Apr 01, 2026
Tracked Since Apr 02, 2026