CVE-2026-7026
Description
A vulnerability was determined in D-Link DGS-3420 1.50.018. This issue affects some unknown processing of the component System Information Settings Page. This manipulation of the argument System Name causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in D-Link DGS-3420 System Information Settings via the System Name parameter allows remote unauthenticated attacks.
Vulnerability
Analysis
The D-Link DGS-3420 switch firmware version 1.50.018 contains a cross-site scripting (XSS) vulnerability in the System Information Settings page. The component fails to sanitize user-supplied input to the 'System Name' argument, allowing an attacker to inject arbitrary web scripts or HTML. This flaw occurs when the system name is stored and later rendered in administrative interface pages without proper escaping [1].
Attack
Vector
An attacker can exploit this vulnerability remotely without requiring authentication, as the System Name field can be set on the unauthenticated configuration page. The manipulated argument triggers stored XSS, meaning the injected payload executes whenever an administrator views the System Information page. Public exploit code is available, lowering the barrier for exploitation [1].
Impact
Successful exploitation allows the attacker to execute malicious scripts in the browser of an authenticated administrator. This could lead to session hijacking, defacement of the management interface, or theft of sensitive configuration data. The CVSS v3 base score of 4.5 indicates a medium severity, reflecting the need for user interaction but significant potential for lateral movement within the network [1].
Mitigation
As of the publication date, D-Link has not released a patch for this vulnerability. Users are advised to restrict access to the management interface via firewall rules or VLAN segmentation, and to monitor for firmware updates from the vendor. The vulnerability is publicly disclosed and should be treated as an active risk [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- cpe:2.3:o:dlink:dgs-3420-28tc_firmware:1.50.018:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- vuldb.com/submit/797877nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/359606nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/359606/ctinvdPermissions RequiredVDB Entry
- www.dlink.comnvdProduct
News mentions
0No linked articles in our index yet.