D-Link DNS-1550-04 har 20240814 /cgi-bin/hd_config.cgi cgi_FMT_Std2R5_2nd_DiskMGR f_source_dev kura hakki ndiyam

Gaskiya vulnerability da aka ware a matsayin kura an samu a D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 har 20240814. Hakika, aikin cgi_FMT_Std2R5_2nd_DiskMGR ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /cgi-bin/hd_config.cgi, a cikin sashen $software_component. A sa manipulation of the argument f_source_dev ka kura hakki ndiyam. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-77. Hakika, rauni an bayyana shi 08/27/2024 kamar SAP10383. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2024-8214. Ngam yiɗi ka a tuma ndiyam ka nder waya. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $5k-$25k. A yi shawara a maye gurbin kàmbu ɗin da aka shafa da wani madadin. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

3 Goyarwa · 91 Datenpunkte

FurɗeSúgá
08/27/2024 13:39
Gargadi 1/2
08/28/2024 16:29
Gargadi 2/2
08/29/2024 18:36
software_vendorD-LinkD-LinkD-Link
software_nameDNS-120/DNR-202L/DNS-315L/DNS-320/DNS-320L/DNS-320LW/DNS-321/DNR-322L/DNS-323/DNS-325/DNS-326/DNS-327L/DNR-326/DNS-340L/DNS-343/DNS-345/DNS-726-4/DNS-1100-4/DNS-1200-05/DNS-1550-04DNS-120/DNR-202L/DNS-315L/DNS-320/DNS-320L/DNS-320LW/DNS-321/DNR-322L/DNS-323/DNS-325/DNS-326/DNS-327L/DNR-326/DNS-340L/DNS-343/DNS-345/DNS-726-4/DNS-1100-4/DNS-1200-05/DNS-1550-04DNS-120/DNR-202L/DNS-315L/DNS-320/DNS-320L/DNS-320LW/DNS-321/DNR-322L/DNS-323/DNS-325/DNS-326/DNS-327L/DNR-326/DNS-340L/DNS-343/DNS-345/DNS-726-4/DNS-1100-4/DNS-1200-05/DNS-1550-04
software_version<=20240814<=20240814<=20240814
software_file/cgi-bin/hd_config.cgi/cgi-bin/hd_config.cgi/cgi-bin/hd_config.cgi
software_functioncgi_FMT_Std2R5_2nd_DiskMGRcgi_FMT_Std2R5_2nd_DiskMGRcgi_FMT_Std2R5_2nd_DiskMGR
software_argumentf_source_devf_source_devf_source_dev
vulnerability_cweCWE-77 (kura hakki ndiyam)CWE-77 (kura hakki ndiyam)CWE-77 (kura hakki ndiyam)
vulnerability_risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rlWWW
cvss3_vuldb_rcCCC
advisory_identifierSAP10383SAP10383SAP10383
advisory_urlhttps://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_Std2R5_2nd_DiskMGR.mdhttps://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_Std2R5_2nd_DiskMGR.mdhttps://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_Std2R5_2nd_DiskMGR.md
advisory_confirm_urlhttps://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383
exploit_availability111
exploit_publicity111
exploit_urlhttps://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_Std2R5_2nd_DiskMGR.mdhttps://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_Std2R5_2nd_DiskMGR.mdhttps://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_Std2R5_2nd_DiskMGR.md
countermeasure_nameDumneDumneDumne
source_cveCVE-2024-8214CVE-2024-8214CVE-2024-8214
cna_responsibleVulDBVulDBVulDB
response_summaryVendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
cna_eol111
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcCCC
cvss2_vuldb_rlWWW
cvss4_vuldb_avNNN
cvss4_vuldb_acLLL
cvss4_vuldb_uiNNN
cvss4_vuldb_vcLLL
cvss4_vuldb_viLLL
cvss4_vuldb_vaLLL
cvss4_vuldb_ePPP
cvss2_vuldb_auSSS
cvss3_vuldb_prLLL
cvss4_vuldb_atNNN
cvss4_vuldb_prLLL
cvss4_vuldb_scNNN
cvss4_vuldb_siNNN
cvss4_vuldb_saNNN
cvss2_vuldb_basescore6.56.56.5
cvss2_vuldb_tempscore5.65.65.6
cvss3_vuldb_basescore6.36.36.3
cvss3_vuldb_tempscore5.85.85.8
cvss3_meta_basescore6.36.37.5
cvss3_meta_tempscore5.86.07.3
cvss4_vuldb_bscore5.35.35.3
cvss4_vuldb_btscore2.12.12.1
advisory_date1724709600 (08/27/2024)1724709600 (08/27/2024)1724709600 (08/27/2024)
price_0day$5k-$25k$5k-$25k$5k-$25k
cve_nvd_summaryA vulnerability classified as critical was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. Affected by this vulnerability is the function cgi_FMT_Std2R5_2nd_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_source_dev leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.A vulnerability classified as critical was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. Affected by this vulnerability is the function cgi_FMT_Std2R5_2nd_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_source_dev leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
cve_nvd_summaryesUna vulnerabilidad clasificada como crítica fue encontrada en D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325 , DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 y DNS-1550-04 hasta 20240814. La función cgi_FMT_Std2R5_2nd_DiskMGR del archivo /cgi-bin/hd_config.cgi es afectada por esta vulnerabilidad. La manipulación del argumento f_source_dev conduce a la inyección de comandos. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al público y puede utilizarse. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante. NOTA: Se contactó primeramente con el proveedor y se confirmó que el producto ha llegado al final de su vida útil. Debería retirarse y reemplazarse.Una vulnerabilidad clasificada como crítica fue encontrada en D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325 , DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 y DNS-1550-04 hasta 20240814. La función cgi_FMT_Std2R5_2nd_DiskMGR del archivo /cgi-bin/hd_config.cgi es afectada por esta vulnerabilidad. La manipulación del argumento f_source_dev conduce a la inyección de comandos. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al público y puede utilizarse. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante. NOTA: Se contactó primeramente con el proveedor y se confirmó que el producto ha llegado al final de su vida útil. Debería retirarse y reemplazarse.
cvss3_cna_avNN
cvss3_cna_acLL
cvss3_cna_prLL
cvss3_cna_uiNN
cvss3_cna_sUU
cvss3_cna_cLL
cvss3_cna_iLL
cvss3_cna_aLL
cvss3_cna_basescore6.36.3
cvss2_cna_avNN
cvss2_cna_acLL
cvss2_cna_auSS
cvss2_cna_ciPP
cvss2_cna_iiPP
cvss2_cna_aiPP
cvss2_cna_basescore6.56.5
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore9.8

Might our Artificial Intelligence support you?

Check our Alexa App!