CVE-2026-2227

A vulnerability was found in D-Link DCS-931L up to 1.13.0. Impacted is the function doSystem of the file /setSystemAdmin. Performing a manipulation of the argument AdminID results in command injection. The attack may be initiated remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/cha0yang1/CVE/blob/main/D-Link%20DCS931L1.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.344944 Permissions Required VDB Entry
https://vuldb.com/?id.344944 Third Party Advisory VDB Entry
https://vuldb.com/?submit.753450 Third Party Advisory VDB Entry
https://vuldb.com/?submit.753980
https://www.dlink.com/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dcs-931l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dcs-931l:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-09 10:15

Updated : 2026-02-23 11:16


NVD link : CVE-2026-2227

Mitre link : CVE-2026-2227

CVE.ORG link : CVE-2026-2227


JSON object : View

Products Affected

dlink

  • dcs-931l_firmware
  • dcs-931l
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')