Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
0

CVE-2024-3272

Disclosure Date: April 04, 2024
Exploited in the Wild
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259283. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
9.8 Critical
Impact Score:
5.9
Exploitability Score:
3.9
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • dlink

Products

  • dnr-202l firmware -,
  • dnr-322l firmware -,
  • dnr-326 firmware -,
  • dns-1100-4 firmware -,
  • dns-120 firmware -,
  • dns-1200-05 firmware -,
  • dns-1550-04 firmware -,
  • dns-315l firmware -,
  • dns-320 firmware -,
  • dns-320l firmware -,
  • dns-320lw firmware -,
  • dns-321 firmware -,
  • dns-323 firmware -,
  • dns-325 firmware -,
  • dns-326 firmware -,
  • dns-327l firmware -,
  • dns-340l firmware -,
  • dns-343 firmware -,
  • dns-345 firmware -,
  • dns-726-4 firmware -

Exploited in the Wild

Reported by:

Additional Info

Technical Analysis