A flaw has been found in D-Link DI-7100G C1 24.04.18D1. This affects the function start_proxy_client_email. Executing a manipulation can lead to command injection. The attack can be executed remotely. The exploit has been published and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/glkfc/IoT-Vulnerability/blob/main/D-Link/Dlink_3.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.344897 | Permissions Required VDB Entry |
| https://vuldb.com/?id.344897 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.749804 | Third Party Advisory VDB Entry |
| https://www.dlink.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
11 Feb 2026, 18:36
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Dlink di-7100g C1
Dlink Dlink di-7100g C1 Firmware |
|
| CPE | cpe:2.3:h:dlink:di-7100g_c1:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:di-7100g_c1_firmware:24.04.18d1:*:*:*:*:*:*:* |
|
| References | () https://github.com/glkfc/IoT-Vulnerability/blob/main/D-Link/Dlink_3.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.344897 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.344897 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.749804 - Third Party Advisory, VDB Entry | |
| References | () https://www.dlink.com/ - Product |
09 Feb 2026, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-09 00:15
Updated : 2026-02-11 18:36
NVD link : CVE-2026-2194
Mitre link : CVE-2026-2194
CVE.ORG link : CVE-2026-2194
JSON object : View
Products Affected
dlink
- di-7100g_c1
- di-7100g_c1_firmware
