PT-2024-7982 · D Link · D-Link Dns-320 +2

Netsecfish

·

Published

2024-11-06

·

Updated

2025-11-28

·

CVE-2024-10915

CVSS v2.0
10
VectorAV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L versions up to 20241028
Description A critical issue exists in the
cgi user add
function of the file
/cgi-bin/account mgr.cgi?cmd=cgi user add
within the affected D-Link devices. Manipulation of the argument group allows for operating system command injection. This allows a remote attacker to execute arbitrary commands on the system. The complexity of a successful attack is considered high, and while exploitation is difficult, a public exploit is available.
Recommendations Update D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L to a version later than 20241028.

Exploit

Fix

Improper Neutralization

OS Command Injection

Special Elements Injection

Weakness Enumeration

Related Identifiers

BDU:2024-09495
CVE-2024-10915

Affected Products

D-Link Dns-320
D-Link Dns-325
D-Link Dns-340L