{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2218","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-08T14:48:00.369Z","datePublished":"2026-02-09T06:02:09.726Z","dateUpdated":"2026-02-23T09:57:39.765Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:57:39.765Z"},"title":"D-Link DCS-933L alphapd setSystemAdmin command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"D-Link","product":"DCS-933L","versions":[{"version":"1.14.0","status":"affected"},{"version":"1.14.1","status":"affected"},{"version":"1.14.2","status":"affected"},{"version":"1.14.3","status":"affected"},{"version":"1.14.4","status":"affected"},{"version":"1.14.5","status":"affected"},{"version":"1.14.6","status":"affected"},{"version":"1.14.7","status":"affected"},{"version":"1.14.8","status":"affected"},{"version":"1.14.9","status":"affected"},{"version":"1.14.10","status":"affected"},{"version":"1.14.11","status":"affected"}],"modules":["alphapd"]}],"descriptions":[{"lang":"en","value":"A vulnerability was determined in D-Link DCS-933L up to 1.14.11. This affects an unknown function of the file /setSystemAdmin of the component alphapd. This manipulation of the argument AdminID causes command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-08T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-12T08:47:13.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"allanp0e (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.344936","name":"VDB-344936 | D-Link DCS-933L alphapd setSystemAdmin command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.344936","name":"VDB-344936 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.753247","name":"Submit #753247 | D-Link DCS933L   v1.14.11 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/jinhao118/cve/blob/main/D-Link%20DCS933L_v1.14.11.md","tags":["related"]},{"url":"https://github.com/jinhao118/cve/blob/main/D-Link%20DCS933L_v1.14.11.md#poc","tags":["exploit"]},{"url":"https://www.dlink.com/","tags":["product"]}],"tags":["unsupported-when-assigned"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-09T16:11:12.479527Z","id":"CVE-2026-2218","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-09T16:11:25.567Z"}}]}}