D-Link DNS-320 2.02b01 Vulnerable to Information Disclosure via Remote Exploit
CVE-2024-8461

5.3MEDIUM

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
5 September 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A vulnerability has been identified within the D-Link DNS-320 web management interface, specifically in the file /cgi-bin/discovery.cgi. This flaw permits unauthorized information disclosure, which can be exploited remotely. The affected product, version 2.02b01 of the DNS-320, is no longer supported by D-Link, as it has reached end-of-life. Users are strongly advised to retire and replace this product to mitigate any security risks associated with this vulnerability.

Affected Version(s)

DNS-320 2.02b01

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)

Credit

leetmoon (VulDB User)
.