CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2023-44424
8.00.09%

You've Got Mail (and a Root Shell): D-Link DIR-X3260 Command Injection

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 1, 2026·5 min read·3 visits

PoC Available

Executive Summary (TL;DR)

Critical OS Command Injection in the `prog.cgi` binary of D-Link DIR-X3260 routers. Attackers on the local network (LAN/Wi-Fi) can inject shell commands via the `EmailTo` parameter in `SetSysEmailSettings`. Frequently chained with CVE-2023-44420 to bypass authentication entirely.

A classic tale of SOHO router insecurity featuring the D-Link DIR-X3260. By abusing the Home Network Administration Protocol (HNAP), an attacker can turn a simple configuration request for email notifications into full root remote code execution. While nominally authenticated, this flaw is practically open season when chained with a sibling authentication bypass.

Official Patches

D-LinkD-Link Security Announcement SAP10365

Technical Appendix

CVSS Score
8.0/ 10
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
0.09%
Top 100% most exploited

Affected Systems

D-Link DIR-X3260 (EXO AX3200 Wi-Fi 6 Router)

Affected Versions Detail

Product
Affected Versions
Fixed Version
DIR-X3260
D-Link
<= 1.02B021.03B02
AttributeDetail
CWE IDCWE-78
Attack VectorAdjacent (AV:A)
CVSS8.0 (High)
ImpactRemote Code Execution (Root)
Componentsprog.cgi / HNAP
Exploit StatusPoC Available (Theoretical)

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1059.004Command and Scripting Interpreter: Unix Shell
Execution
CWE-78
OS Command Injection

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

Known Exploits & Detection

ZDIOriginal advisory by Nicholas Zubrisky

Vulnerability Timeline

ZDI publishes advisory ZDI-23-1522
2023-10-18
D-Link releases firmware patch v1.03B02
2023-10-18

References & Sources

  • [1]ZDI Advisory ZDI-23-1522
  • [2]MITRE CVE Entry
Related Vulnerabilities
CVE-2023-44420CVE-2023-44425CVE-2023-44426

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.