No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D-link
D-link dns-320 |
|
| Vendors & Products |
D-link
D-link dns-320 |
Mon, 11 May 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in D-Link DNS-320 2.06B01. This affects the function delete/rename/copy/move/chmod/chown of the file /cgi-bin/webfile_mgr.cgi. The manipulation results in os command injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. | |
| Title | D-Link DNS-320 webfile_mgr.cgi chown os command injection | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-11T04:15:09.863Z
Reserved: 2026-05-10T15:53:56.029Z
Link: CVE-2026-8272
No data.
Status : Received
Published: 2026-05-11T05:16:16.253
Modified: 2026-05-11T05:16:16.253
Link: CVE-2026-8272
No data.
OpenCVE Enrichment
Updated: 2026-05-11T06:30:29Z