10

CVE-2024-3272

Warning
Exploit

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259283. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

Data is provided by the National Vulnerability Database (NVD)
DlinkDns-320l Firmware Version1.01.0702.2013
   DlinkDns-320l Version-
DlinkDns-320l Firmware Version1.03.0904.2013
   DlinkDns-320l Version-
DlinkDns-320l Firmware Version1.11
   DlinkDns-320l Version-
DlinkDns-120 Firmware Version-
   DlinkDns-120 Version-
DlinkDnr-202l Firmware Version-
   DlinkDnr-202l Version-
DlinkDns-315l Firmware Version-
   DlinkDns-315l Version-
DlinkDns-320 Firmware Version-
   DlinkDns-320 Version-
DlinkDns-320lw Firmware Version-
   DlinkDns-320lw Version-
DlinkDns-321 Firmware Version-
   DlinkDns-321 Version-
DlinkDnr-322l Firmware Version-
   DlinkDnr-322l Version-
DlinkDns-323 Firmware Version-
   DlinkDns-323 Version-
DlinkDns-325 Firmware Version1.01
   DlinkDns-325 Version-
DlinkDns-326 Firmware Version-
   DlinkDns-326 Version-
DlinkDns-327l Firmware Version1.00.0409.2013
   DlinkDns-327l Version-
DlinkDns-327l Firmware Version1.09
   DlinkDns-327l Version-
DlinkDnr-326 Firmware Version-
   DlinkDnr-326 Version-
DlinkDns-340l Firmware Version1.08
   DlinkDns-340l Version-
DlinkDns-343 Firmware Version-
   DlinkDns-343 Version-
DlinkDns-345 Firmware Version-
   DlinkDns-345 Version-
DlinkDns-726-4 Firmware Version-
   DlinkDns-726-4 Version-
DlinkDns-1100-4 Firmware Version-
   DlinkDns-1100-4 Version-
DlinkDns-1200-05 Firmware Version-
   DlinkDns-1200-05 Version-
DlinkDns-1550-04 Firmware Version-
   DlinkDns-1550-04 Version-

11.04.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog

D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability

Vulnerability

D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contains a hard-coded credential that allows an attacker to conduct authenticated command injection, leading to remote, unauthorized code execution.

Description

This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 94.15% 0.999
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cna@vuldb.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cna@vuldb.com 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-798 Use of Hard-coded Credentials

The product contains hard-coded credentials, such as a password or cryptographic key.