Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.152068
Category:Web application abuses
Title:D-Link DNS/DNR Devices Multiple Vulnerabilities (SAP10383) - Active Check
Summary:Multiple D-Link DNS and DNR devices are prone to multiple; vulnerabilities.
Description:Summary:
Multiple D-Link DNS and DNR devices are prone to multiple
vulnerabilities.

Vulnerability Insight:
The following vulnerabilities exist:

- CVE-2024-3272: Backdoor through username and password exposure

- CVE-2024-3273: Command injection through the system parameter

- CVE-2024-3274: Information disclosure through unauthenticated CGI script access

- CVE-2024-7715: Command injection through the argument filter in /cgi-bin/photocenter_mgr.cgi

- CVE-2024-7828, CVE-2024-7829, CVE-2024-7830, CVE-2024-7831, CVE-2024-7832, CVE-2024-7849:
Buffer Overflow

Affected Software/OS:
Various D-Link DNS and DNR devices. Please see the vendor
advisory for a full list of affected devices.

Solution:
No solution was made available by the vendor. General solution
options are to upgrade to a newer release, disable respective features, remove the product or
replace the product by another one.

The vendor states that the affected devices are EoL and recommends to immediately retire and
replace such devices.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2024-3272
VDB-259283 | CTI Indicators (IOB, IOC, TTP, IOA)
https://vuldb.com/?ctiid.259283
VDB-259283 | D-Link DNS-320L/DNS-325/DNS-327L/DNS-340L HTTP GET Request nas_sharing.cgi hard-coded credentials
https://vuldb.com/?id.259283
https://github.com/netsecfish/dlink
https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383
Common Vulnerability Exposure (CVE) ID: CVE-2024-3273
Submit #304661 | D-LINK DNS-340L, DNS-320L, DNS-327L, DNS-325 Version 1.11, Version 1.00.0409.2013, Version 1.09, Version 1.08, Version 1.03.0904.2013, Version 1.01 Command Injection, Backdoor Account
https://vuldb.com/?submit.304661
VDB-259284 | CTI Indicators (IOB, IOC, TTP, IOA)
https://vuldb.com/?ctiid.259284
VDB-259284 | D-Link DNS-320L/DNS-325/DNS-327L/DNS-340L HTTP GET Request nas_sharing.cgi command injection
https://vuldb.com/?id.259284
Common Vulnerability Exposure (CVE) ID: CVE-2024-3274
Submit #304706 | D-LINK DNS-327L, DNS-320L, DNS-320LW Version=1.02.0329.2013, Version=1.01.0914.2012, Version=1.01.0914.2012, Version=1.00.0409.2013 Exposure of Sensitive Information to an Unauthorized Actor
https://vuldb.com/?submit.304706
VDB-259285 | CTI Indicators (IOB, IOC, TTP, IOA)
https://vuldb.com/?ctiid.259285
VDB-259285 | D-Link DNS-320L/DNS-320LW/DNS-327L HTTP GET Request info.cgi information disclosure
https://vuldb.com/?id.259285
https://github.com/netsecfish/info_cgi
Common Vulnerability Exposure (CVE) ID: CVE-2024-7715
Common Vulnerability Exposure (CVE) ID: CVE-2024-7828
Common Vulnerability Exposure (CVE) ID: CVE-2024-7829
Common Vulnerability Exposure (CVE) ID: CVE-2024-7830
Common Vulnerability Exposure (CVE) ID: CVE-2024-7831
Common Vulnerability Exposure (CVE) ID: CVE-2024-7832
Common Vulnerability Exposure (CVE) ID: CVE-2024-7849
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.