D-Link DNS-1550-04 जोपर्यंत 20240814 /cgi-bin/hd_config.cgi cgi_FMT_R12R5_2nd_DiskMGR f_source_dev विशेषाधिकार वाढीचे प्रमाण वाढले

एक कमकुवतपणा जो गंभीर म्हणून वर्गीकृत केला आहे, तो D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 जोपर्यंत 20240814 मध्ये आढळून आला आहे. या ठिकाणी परिणाम झाला आहे फंक्शन cgi_FMT_R12R5_2nd_DiskMGR फाइल /cgi-bin/hd_config.cgi च्या. सॉफ्टवेअरमध्ये f_source_dev या आर्ग्युमेंटचे केलेली छेडछाड विशेषाधिकार वाढीचे प्रमाण वाढले निर्माण करते. समस्या जाहीर करण्यासाठी CWE वापरल्यास CWE-77 येथे नेले जाते. ही कमतरता प्रसिद्ध करण्यात आली होती 27/08/2024 म्हणून SAP10383. डाउनलोडसाठी सल्ला github.com वर शेअर केला आहे. ही असुरक्षा CVE-2024-8212 म्हणून नोंदवली गेली आहे. दूरवरून हा हल्ला घडवून आणता येतो. तांत्रिक तपशील दिलेले आहेत. यासाठी एक एक्स्प्लॉइट उपलब्ध आहे. शोषण सार्वजनिकपणे जाहीर झाले आहे आणि त्याचा वापर होऊ शकतो. सध्या USD $0-$5k इतका असू शकतो. MITRE ATT&CK प्रकल्प T1202 हल्ला तंत्रज्ञान म्हणून घोषित करतो. प्रूफ-ऑफ-कॉन्सेप्ट म्हणून हे घोषित केले गेले आहे. डाउनलोडसाठी शोषण github.com वर उपलब्ध आहे. 0-डे म्हणून त्याची अंदाजे भूमिगत किंमत $5k-$25k होती. प्रभावित घटक बदलून त्याऐवजी पर्यायी घटक वापरण्याची शिफारस केली जाते. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

3 बदल · 91 डेटा पॉइंट्स

शेततयार केली
27/08/2024 01:39 PM
अद्ययावत 1/2
28/08/2024 04:29 PM
अद्ययावत 2/2
29/08/2024 06:36 PM
software_vendorD-LinkD-LinkD-Link
software_nameDNS-120/DNR-202L/DNS-315L/DNS-320/DNS-320L/DNS-320LW/DNS-321/DNR-322L/DNS-323/DNS-325/DNS-326/DNS-327L/DNR-326/DNS-340L/DNS-343/DNS-345/DNS-726-4/DNS-1100-4/DNS-1200-05/DNS-1550-04DNS-120/DNR-202L/DNS-315L/DNS-320/DNS-320L/DNS-320LW/DNS-321/DNR-322L/DNS-323/DNS-325/DNS-326/DNS-327L/DNR-326/DNS-340L/DNS-343/DNS-345/DNS-726-4/DNS-1100-4/DNS-1200-05/DNS-1550-04DNS-120/DNR-202L/DNS-315L/DNS-320/DNS-320L/DNS-320LW/DNS-321/DNR-322L/DNS-323/DNS-325/DNS-326/DNS-327L/DNR-326/DNS-340L/DNS-343/DNS-345/DNS-726-4/DNS-1100-4/DNS-1200-05/DNS-1550-04
software_version<=20240814<=20240814<=20240814
software_file/cgi-bin/hd_config.cgi/cgi-bin/hd_config.cgi/cgi-bin/hd_config.cgi
software_functioncgi_FMT_R12R5_2nd_DiskMGRcgi_FMT_R12R5_2nd_DiskMGRcgi_FMT_R12R5_2nd_DiskMGR
software_argumentf_source_devf_source_devf_source_dev
vulnerability_cweCWE-77 (विशेषाधिकार वाढीचे प्रमाण वाढले)CWE-77 (विशेषाधिकार वाढीचे प्रमाण वाढले)CWE-77 (विशेषाधिकार वाढीचे प्रमाण वाढले)
vulnerability_risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rlWWW
cvss3_vuldb_rcCCC
advisory_identifierSAP10383SAP10383SAP10383
advisory_urlhttps://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R12R5_2nd_DiskMGR.mdhttps://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R12R5_2nd_DiskMGR.mdhttps://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R12R5_2nd_DiskMGR.md
advisory_confirm_urlhttps://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383
exploit_availability111
exploit_publicity111
exploit_urlhttps://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R12R5_2nd_DiskMGR.mdhttps://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R12R5_2nd_DiskMGR.mdhttps://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R12R5_2nd_DiskMGR.md
countermeasure_nameपर्यायीपर्यायीपर्यायी
source_cveCVE-2024-8212CVE-2024-8212CVE-2024-8212
cna_responsibleVulDBVulDBVulDB
response_summaryVendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
cna_eol111
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcCCC
cvss2_vuldb_rlWWW
cvss4_vuldb_avNNN
cvss4_vuldb_acLLL
cvss4_vuldb_uiNNN
cvss4_vuldb_vcLLL
cvss4_vuldb_viLLL
cvss4_vuldb_vaLLL
cvss4_vuldb_ePPP
cvss2_vuldb_auSSS
cvss3_vuldb_prLLL
cvss4_vuldb_atNNN
cvss4_vuldb_prLLL
cvss4_vuldb_scNNN
cvss4_vuldb_siNNN
cvss4_vuldb_saNNN
cvss2_vuldb_basescore6.56.56.5
cvss2_vuldb_tempscore5.65.65.6
cvss3_vuldb_basescore6.36.36.3
cvss3_vuldb_tempscore5.85.85.8
cvss3_meta_basescore6.36.37.5
cvss3_meta_tempscore5.86.07.3
cvss4_vuldb_bscore5.35.35.3
cvss4_vuldb_btscore2.12.12.1
advisory_date1724709600 (27/08/2024)1724709600 (27/08/2024)1724709600 (27/08/2024)
price_0day$5k-$25k$5k-$25k$5k-$25k
cve_nvd_summaryA vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been rated as critical. This issue affects the function cgi_FMT_R12R5_2nd_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_source_dev leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been rated as critical. This issue affects the function cgi_FMT_R12R5_2nd_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_source_dev leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
cve_nvd_summaryesSe encontró una vulnerabilidad en D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS- 326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 y DNS-1550-04 hasta 20240814. ha sido calificado como crítico. Este problema afecta la función cgi_FMT_R12R5_2nd_DiskMGR del archivo /cgi-bin/hd_config.cgi. La manipulación del argumento f_source_dev conduce a la inyección de comandos. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante. NOTA: Se contactó primeramente con el proveedor y se confirmó que el producto ha llegado al final de su vida útil. Debería retirarse y reemplazarse.Se encontró una vulnerabilidad en D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS- 326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 y DNS-1550-04 hasta 20240814. ha sido calificado como crítico. Este problema afecta la función cgi_FMT_R12R5_2nd_DiskMGR del archivo /cgi-bin/hd_config.cgi. La manipulación del argumento f_source_dev conduce a la inyección de comandos. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante. NOTA: Se contactó primeramente con el proveedor y se confirmó que el producto ha llegado al final de su vida útil. Debería retirarse y reemplazarse.
cvss3_cna_avNN
cvss3_cna_acLL
cvss3_cna_prLL
cvss3_cna_uiNN
cvss3_cna_sUU
cvss3_cna_cLL
cvss3_cna_iLL
cvss3_cna_aLL
cvss3_cna_basescore6.36.3
cvss2_cna_avNN
cvss2_cna_acLL
cvss2_cna_auSS
cvss2_cna_ciPP
cvss2_cna_iiPP
cvss2_cna_aiPP
cvss2_cna_basescore6.56.5
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore9.8

Want to stay up to date on a daily basis?

Enable the mail alert feature now!