9.8
CVE-2024-8211
- EPSS 2.6%
- Veröffentlicht 27.08.2024 19:15:18
- Zuletzt bearbeitet 29.08.2024 15:54:56
- Quelle cna@vuldb.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been declared as critical. This vulnerability affects the function cgi_FMT_Std2R1_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_newly_dev leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Dlink ≫ Dns-315l Firmware Version-
Dlink ≫ Dns-320lw Firmware Version-
Dlink ≫ Dns-1550-04 Firmware Version-
Dlink ≫ Dns-1200-05 Firmware Version-
Dlink ≫ Dns-1100-4 Firmware Version-
Dlink ≫ Dns-726-4 Firmware Version-
Dlink ≫ Dns-345 Firmware Version-
Dlink ≫ Dns-343 Firmware Version-
Dlink ≫ Dns-340l Firmware Version-
Dlink ≫ Dnr-326 Firmware Version-
Dlink ≫ Dns-327l Firmware Version-
Dlink ≫ Dns-326 Firmware Version-
Dlink ≫ Dns-325 Firmware Version-
Dlink ≫ Dns-323 Firmware Version-
Dlink ≫ Dnr-322l Firmware Version-
Dlink ≫ Dns-321 Firmware Version-
Dlink ≫ Dns-320l Firmware Version-
Dlink ≫ Dns-320 Firmware Version-
Dlink ≫ Dnr-202l Firmware Version-
Dlink ≫ Dns-120 Firmware Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 2.6% | 0.851 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cna@vuldb.com | 5.3 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
cna@vuldb.com | 6.3 | 2.8 | 3.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
|
cna@vuldb.com | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.