{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2085","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-06T08:20:31.394Z","datePublished":"2026-02-07T12:02:08.316Z","dateUpdated":"2026-02-23T09:32:00.509Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:32:00.509Z"},"title":"D-Link DWR-M921 USSD Configuration Endpoint formUSSDSetup sub_419F20 command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"D-Link","product":"DWR-M921","versions":[{"version":"1.1.50","status":"affected"}],"modules":["USSD Configuration Endpoint"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in D-Link DWR-M921 1.1.50. Affected is the function sub_419F20 of the file /boafrm/formUSSDSetup of the component USSD Configuration Endpoint. The manipulation of the argument ussdValue leads to command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":7.2,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.2,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":8.3,"vectorString":"AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-06T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-09T15:47:39.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LX-66-LX (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.344652","name":"VDB-344652 | D-Link DWR-M921 USSD Configuration Endpoint formUSSDSetup sub_419F20 command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.344652","name":"VDB-344652 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.746400","name":"Submit #746400 | D-Link DWR-M921 V1.1.50 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/LX-66-LX/cve-new/issues/1","tags":["issue-tracking"]},{"url":"https://github.com/LX-66-LX/cve-new/issues/1#issue-3851345029","tags":["exploit","issue-tracking"]},{"url":"https://www.dlink.com/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-10T15:45:29.721205Z","id":"CVE-2026-2085","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-10T15:45:41.219Z"}}]}}