Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
0

CVE-2024-3273

Disclosure Date: April 04, 2024
Exploited in the Wild
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
9.8 Critical
Impact Score:
5.9
Exploitability Score:
3.9
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • dlink

Products

  • dnr-202l firmware -,
  • dnr-322l firmware -,
  • dnr-326 firmware -,
  • dns-1100-4 firmware -,
  • dns-120 firmware -,
  • dns-1200-05 firmware -,
  • dns-1550-04 firmware -,
  • dns-315l firmware -,
  • dns-320 firmware -,
  • dns-320l firmware -,
  • dns-320lw firmware -,
  • dns-321 firmware -,
  • dns-323 firmware -,
  • dns-325 firmware -,
  • dns-326 firmware -,
  • dns-327l firmware -,
  • dns-340l firmware -,
  • dns-343 firmware -,
  • dns-345 firmware -,
  • dns-726-4 firmware -

Exploited in the Wild

Reported by:

Additional Info

Technical Analysis