Critical Vulnerability in D-Link Devices Could Lead to Command Injection

CVE-2024-7715
6.3MEDIUM

Key Information

Vendor
D-link
Status
Dns-120
Dnr-202l
Dns-315l
Dns-320
Vendor
CVE Published:
13 August 2024

Summary

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240812. It has been classified as critical. This affects the function sprintf of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument filter leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.

Affected Version(s)

DNS-120 = 20240812

DNR-202L = 20240812

DNS-315L = 20240812

CVSS V3.1

Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • VulDB entry last update

  • Risk change from: null to: 6.3 - (MEDIUM)

  • VulDB entry created

  • Advisory disclosed

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database

Credit

BuaaIoTTeam (VulDB User)
.