D-Link Products at Risk of Command Injection Vulnerability
CVE-2024-8127
Key Information:
Badges
Summary
A command injection vulnerability has been identified in various D-Link network storage products, notably in the CGI handler file /cgi-bin/webfile_mgr.cgi. This flaw arises from improper handling of a specific argument within the cgi_unzip function, enabling remote attackers to execute arbitrary commands. The vulnerability affects multiple models including DNS-120, DNS-320, and several others listed, particularly those that are no longer supported or have reached end-of-life, making them more susceptible to exploitation. It is crucial for users of the affected devices to consider retiring and replacing outdated products to mitigate potential risks.
Affected Version(s)
DNR-202L 20240814
DNR-322L 20240814
DNR-326 20240814
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
3% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved