CVE-2026-2163
Published: 08 February 2026
Summary
CVE-2026-2163 is a medium-severity Injection (CWE-74) vulnerability in Dlink Dir-600 Firmware. Its CVSS base score is 4.7 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Developer assessments and testing (including injection-focused techniques) identify improper neutralization of special elements, and the verifiable flaw remediation corrects them pre-deployment.
Identifies indicators of injection attacks (command, SQL, LDAP, etc.) via anomaly and attack monitoring.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in public-facing router CGI directly enables remote exploitation of the web interface (T1190) and arbitrary command execution on a network device (T1059.008).
NVD Description
A vulnerability was identified in D-Link DIR-600 up to 2.15WWb02. This vulnerability affects unknown code of the file ssdp.cgi. Such manipulation of the argument HTTP_ST/REMOTE_ADDR/REMOTE_PORT/SERVER_ID leads to command injection. The attack may be launched remotely. The exploit is publicly available…
more
and might be used. This vulnerability only affects products that are no longer supported by the maintainer.
Deeper analysisAI
CVE-2026-2163 is a command injection vulnerability (CWE-74, CWE-77) in the ssdp.cgi file of D-Link DIR-600 routers, affecting versions up to 2.15WWb02. The flaw resides in unknown code that improperly handles manipulation of the arguments HTTP_ST, REMOTE_ADDR, REMOTE_PORT, and SERVER_ID, enabling attackers to inject and execute arbitrary commands.
The vulnerability is exploitable remotely over the network (AV:N) with low complexity (AC:L) but requires high privileges (PR:H) and no user interaction (UI:N), resulting in unchanged scope (S:U) and low impacts on confidentiality, integrity, and availability (C:L/I:L/A:L), for an overall CVSS v3.1 score of 4.7. Attackers with sufficient access can achieve remote arbitrary command execution.
Advisories note that affected products are no longer supported by the maintainer, with no patches available. References include GitHub proof-of-concept exploits demonstrating remote arbitrary command execution and VulDB entries (ctiid.344865, id.344865) providing further details on the issue.
A public exploit is available and might be used against vulnerable devices.
Details
- CWE(s)