Command Injection Vulnerability in D-Link Network Storage Devices
CVE-2024-8210
Key Information:
Badges
Summary
A serious command injection vulnerability has been identified in multiple D-Link network storage devices, specifically in the function sprintf of the /cgi-bin/hd_config.cgi file. The vulnerability can be exploited remotely through the manipulation of the argument f_mount, allowing malicious actors to execute arbitrary commands on the affected devices. This issue impacts a range of products that are no longer supported by D-Link, meaning these devices may remain exposed to potential threats. Users are strongly advised to discontinue the use of affected models, as they are classified as end-of-life and have not received security updates.
Affected Version(s)
DNR-202L 20240814
DNR-322L 20240814
DNR-326 20240814
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved