PT-2024-7744 · D Link · D-Link Dns-325+2
Netsecfish
·
Published
2024-11-06
·
Updated
2025-12-01
·
CVE-2024-10914
CVSS v2.0
7.6
7.6
High
| Base vector | Vector | AV:N/AC:H/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
D-Link DNS-320 versions prior to 20241028
D-Link DNS-320LW versions prior to 20241028
D-Link DNS-325 versions prior to 20241028
D-Link DNS-340L versions prior to 20241028
Description
A critical vulnerability exists in D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L devices. The issue is a command injection flaw located in the
cgi user add function of the /cgi-bin/account mgr.cgi?cmd=cgi user add file. Manipulation of the name argument allows for the execution of arbitrary operating system commands. The attack can be launched remotely. Exploitation is considered difficult, but a public exploit is available. Approximately 61,000 devices worldwide are estimated to be affected, with exploitation attempts observed starting November 12th. The vulnerability is due to insufficient input validation of the name parameter, enabling attackers to inject shell commands.Recommendations
D-Link DNS-320: As D-Link will not release a patch, replace the device with a supported model or restrict access from external networks.
D-Link DNS-320LW: As D-Link will not release a patch, replace the device with a supported model or restrict access from external networks.
D-Link DNS-325: As D-Link will not release a patch, replace the device with a supported model or restrict access from external networks.
D-Link DNS-340L: As D-Link will not release a patch, replace the device with a supported model or restrict access from external networks.
Exploit
Fix
Improper Neutralization
Special Elements Injection
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
BDU:2024-09234
CVE-2024-10914
Affected Products
D-Link Dns-320
D-Link Dns-325
D-Link Dns-340L
References · 100
- 🔥 https://github.com/verylazytech/CVE-2024-10914⭐ 40 🔗 12 · Exploit
- 🔥 https://github.com/imnotcha0s/CVE-2024-10914⭐ 11 🔗 4 · Exploit
- 🔥 https://github.com/ThemeHackers/CVE-2024-10914⭐ 3 🔗 1 · Exploit
- 🔥 https://github.com/redspy-sec/D-Link⭐ 3 · Exploit
- 🔥 https://netsecfish.notion.site/Command-Injection-Vulnerability-in-name-parameter-for-D-Link-NAS-12d6b683e67c80c49ffcc9214c239a07?pvs=4 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2024-10914 · Security Note
- https://bdu.fstec.ru/vul/2024-09234 · Security Note
- https://twitter.com/CVEnew/status/1854157358911336670 · Twitter Post
- https://twitter.com/transilienceai/status/1855298677390418403 · Twitter Post
- https://twitter.com/OstorlabSec/status/1864680854745760021 · Twitter Post
- https://twitter.com/cysdat/status/1856220801391046694 · Twitter Post
- https://twitter.com/transilienceai/status/1855298709518709147 · Twitter Post
- https://twitter.com/Patrowl_io/status/1856281396043456746 · Twitter Post
- https://twitter.com/jbhall56/status/1855961186103091688 · Twitter Post
- https://twitter.com/MrsYisWhy/status/1915040943352303926 · Twitter Post