9.8
CVE-2024-7922
- EPSS 8.23%
- Published 19.08.2024 15:15:09
- Last modified 20.08.2024 16:20:25
- Source cna@vuldb.com
- Teams watchlist Login
- Open Login
A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this issue is the function cgi_audio_search/cgi_create_playlist/cgi_get_album_all_tracks/cgi_get_alltracks_editlist/cgi_get_artist_all_album/cgi_get_genre_all_tracks/cgi_get_tracks_list/cgi_set_airplay_content/cgi_write_playlist of the file /cgi-bin/myMusic.cgi. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
Data is provided by the National Vulnerability Database (NVD)
Dell ≫ Dns-120 Firmware Version-
Dell ≫ Dnr-202l Firmware Version-
Dell ≫ Dns-315l Firmware Version-
Dell ≫ Dns-320 Firmware Version-
Dell ≫ Dns-320l Firmware Version-
Dell ≫ Dns-320lw Firmware Version-
Dell ≫ Dns-321 Firmware Version-
Dell ≫ Dnr-322l Firmware Version-
Dell ≫ Dns-323 Firmware Version-
Dell ≫ Dns-325 Firmware Version-
Dell ≫ Dns-326 Firmware Version-
Dell ≫ Dns-327l Firmware Version-
Dell ≫ Dnr-326 Firmware Version-
Dell ≫ Dns-340l Firmware Version-
Dell ≫ Dns-343 Firmware Version-
Dell ≫ Dns-345 Firmware Version-
Dell ≫ Dns-726-4 Firmware Version-
Dell ≫ Dns-1100-4 Firmware Version-
Dell ≫ Dns-1200-05 Firmware Version-
Dell ≫ Dns-1550-04 Firmware Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 8.23% | 0.919 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cna@vuldb.com | 5.3 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
cna@vuldb.com | 6.3 | 2.8 | 3.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
|
cna@vuldb.com | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.