{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2000","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-05T17:18:39.350Z","datePublished":"2026-02-06T06:32:05.840Z","dateUpdated":"2026-02-23T09:22:13.715Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:22:13.715Z"},"title":"DCN DCME-320 Web Management Backend bridge_cfg.php apply_config command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"DCN","product":"DCME-320","versions":[{"version":"20260121","status":"affected"}],"modules":["Web Management Backend"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in DCN DCME-320 up to 20260121. Impacted is the function apply_config of the file /function/system/basic/bridge_cfg.php of the component Web Management Backend. Performing a manipulation of the argument ip_list results in command injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-05T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-18T01:03:36.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"physicszq (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.344548","name":"VDB-344548 | DCN DCME-320 Web Management Backend bridge_cfg.php apply_config command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.344548","name":"VDB-344548 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.743455","name":"Submit #743455 | 北京神州数码云科信息技术有限公司 Dcme320  latest Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/physicszq/Routers/tree/main/Dcme","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-12T15:08:08.048195Z","id":"CVE-2026-2000","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-12T15:08:14.859Z"}}]}}