CVE-2024-8131
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
24/08/2024
Last modified:
27/08/2024
Description
A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this issue is the function module_enable_disable of the file /cgi-bin/apkg_mgr.cgi of the component HTTP POST Request Handler. The manipulation of the argument f_module_name leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:dlink:dns-1550-04_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dlink:dns-1550-04:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dns-1200-05_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dlink:dns-1200-05:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dns-1100-4_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dlink:dns-1100-4:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dns-726-4_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dlink:dns-726-4:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dns-345_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dlink:dns-345:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dns-343_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dlink:dns-343:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dns-340l_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dlink:dns-340l:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dnr-326_firmware:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



