VYPR
Low severity2.4NVD Advisory· Published Apr 26, 2026· Updated Apr 30, 2026

CVE-2026-7027

CVE-2026-7027

Description

A vulnerability was identified in D-Link DSL-2740R EU_01.15. Impacted is an unknown function of the component Wireless Setup Section. Such manipulation of the argument Wireless Network Name leads to cross site scripting. The attack can be executed remotely. The exploit is publicly available and might be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored cross-site scripting vulnerability exists in the Wireless Network Name field of the D-Link DSL-2740R (firmware EU_01.15) Wireless Setup, allowing remote unauthenticated attacks.

Root

Cause

The vulnerability resides in the Wireless Setup Section of the D-Link DSL-2740R router running firmware version EU_01.15. Manipulation of the argument “Wireless Network Name” (the SSID field) triggers a cross-site scripting (XSS) condition. This indicates that the application fails to sanitize user-supplied input before rendering it in the administrative web interface, allowing arbitrary script or HTML injection.

Attack

Vector

The attack can be executed remotely. Since the router’s web management interface is typically accessible over the local network, an unauthenticated attacker who can reach the management page may exploit the flaw by crafting a malicious SSID value that, when saved and later displayed in the browser, executes attacker-controlled scripts [1]. The exploit is publicly available, lowering the barrier to exploitation.

Impact

Successful exploitation could allow an attacker to execute JavaScript in the context of the authenticated administrator’s session. This can lead to session hijacking, defacement of the management interface, or theft of sensitive configuration data. The CVSS score is 2.4 (Low), suggesting limited direct impact, though the availability of a public exploit elevates the real-world risk for unpatched devices.

Mitigation

As of the publication date, D-Link has not released a patched firmware for the DSL-2740R. Users should restrict access to the router’s web interface to trusted local hosts only, disable remote administration if possible, and monitor for an official firmware update from D-Link [1].

References
  1. Landing

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.