CVE-2024-3272
Severity CVSS v4.0:
Pending analysis
Type:
CWE-798
Use of Hard-coded Credentials
Publication date:
04/04/2024
Last modified:
29/11/2024
Description
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259283. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:dlink:dns-320l_firmware:1.01.0702.2013:*:*:*:*:*:*:* | ||
cpe:2.3:o:dlink:dns-320l_firmware:1.03.0904.2013:*:*:*:*:*:*:* | ||
cpe:2.3:o:dlink:dns-320l_firmware:1.11:*:*:*:*:*:*:* | ||
cpe:2.3:h:dlink:dns-320l:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:dlink:dns-120_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:dlink:dns-120:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:dlink:dnr-202l_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:dlink:dnr-202l:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:dlink:dns-315l_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:dlink:dns-315l:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:dlink:dns-320_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:dlink:dns-320lw_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:dlink:dns-320lw:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:dlink:dns-321:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/netsecfish/dlink
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383
- https://vuldb.com/?ctiid_259283=
- https://vuldb.com/?id_259283=
- https://github.com/netsecfish/dlink
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383
- https://vuldb.com/?ctiid_259283=
- https://vuldb.com/?id_259283=