CVE-2026-7027
Description
A vulnerability was identified in D-Link DSL-2740R EU_01.15. Impacted is an unknown function of the component Wireless Setup Section. Such manipulation of the argument Wireless Network Name leads to cross site scripting. The attack can be executed remotely. The exploit is publicly available and might be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stored cross-site scripting vulnerability exists in the Wireless Network Name field of the D-Link DSL-2740R (firmware EU_01.15) Wireless Setup, allowing remote unauthenticated attacks.
Root
Cause
The vulnerability resides in the Wireless Setup Section of the D-Link DSL-2740R router running firmware version EU_01.15. Manipulation of the argument “Wireless Network Name” (the SSID field) triggers a cross-site scripting (XSS) condition. This indicates that the application fails to sanitize user-supplied input before rendering it in the administrative web interface, allowing arbitrary script or HTML injection.
Attack
Vector
The attack can be executed remotely. Since the router’s web management interface is typically accessible over the local network, an unauthenticated attacker who can reach the management page may exploit the flaw by crafting a malicious SSID value that, when saved and later displayed in the browser, executes attacker-controlled scripts [1]. The exploit is publicly available, lowering the barrier to exploitation.
Impact
Successful exploitation could allow an attacker to execute JavaScript in the context of the authenticated administrator’s session. This can lead to session hijacking, defacement of the management interface, or theft of sensitive configuration data. The CVSS score is 2.4 (Low), suggesting limited direct impact, though the availability of a public exploit elevates the real-world risk for unpatched devices.
Mitigation
As of the publication date, D-Link has not released a patched firmware for the DSL-2740R. Users should restrict access to the router’s web interface to trusted local hosts only, disable remote administration if possible, and monitor for an official firmware update from D-Link [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- cpe:2.3:o:dlink:dsl-2740r_firmware:eu_01.15:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- vuldb.com/submit/797896nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/359607nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/359607/ctinvdPermissions RequiredVDB Entry
- www.dlink.comnvdProduct
News mentions
0No linked articles in our index yet.