9.8

CVE-2024-8214

Exploit

A vulnerability classified as critical was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. Affected by this vulnerability is the function cgi_FMT_Std2R5_2nd_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_source_dev leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.

Data is provided by the National Vulnerability Database (NVD)
DlinkDns-315l Firmware Version-
   DlinkDns-315l Version-
DlinkDns-320lw Firmware Version-
   DlinkDns-320lw Version-
DlinkDns-1550-04 Firmware Version-
   DlinkDns-1550-04 Version-
DlinkDns-1200-05 Firmware Version-
   DlinkDns-1200-05 Version-
DlinkDns-1100-4 Firmware Version-
   DlinkDns-1100-4 Version-
DlinkDns-726-4 Firmware Version-
   DlinkDns-726-4 Version-
DlinkDns-345 Firmware Version-
   DlinkDns-345 Version-
DlinkDns-343 Firmware Version-
   DlinkDns-343 Version-
DlinkDns-340l Firmware Version-
   DlinkDns-340l Version-
DlinkDnr-326 Firmware Version-
   DlinkDnr-326 Version-
DlinkDns-327l Firmware Version-
   DlinkDns-327l Version-
DlinkDns-326 Firmware Version-
   DlinkDns-326 Version-
DlinkDns-325 Firmware Version-
   DlinkDns-325 Version-
DlinkDns-323 Firmware Version-
   DlinkDns-323 Version-
DlinkDnr-322l Firmware Version-
   DlinkDnr-322l Version-
DlinkDns-321 Firmware Version-
   DlinkDns-321 Version-
DlinkDns-320l Firmware Version-
   DlinkDns-320l Version-
DlinkDns-320 Firmware Version-
   DlinkDns-320 Version-
DlinkDnr-202l Firmware Version-
   DlinkDnr-202l Version-
DlinkDns-120 Firmware Version-
   DlinkDns-120 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.86% 0.742
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cna@vuldb.com 5.3 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
cna@vuldb.com 6.3 2.8 3.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cna@vuldb.com 6.5 8 6.4
AV:N/AC:L/Au:S/C:P/I:P/A:P
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.