Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-3273— D-Link DNS-320L/DNS-325/DNS-327L/DNS-340L HTTP GET Request nas_sharing.cgi command injection

CVSS 7.3 · High KEV EPSS 94.42% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-3273

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
D-Link DNS-320L/DNS-325/DNS-327L/DNS-340L HTTP GET Request nas_sharing.cgi command injection
Source: NVD (National Vulnerability Database)
Vulnerability Description
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
在命令中使用的特殊元素转义处理不恰当(命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
D-Link DNS-320 命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
D-Link DNS-320是中国友讯(D-Link)公司的一款NAS(网络附属存储)设备。 D-Link DNS-320L存在命令注入漏洞,该漏洞源于文件/cgi-bin/nas_sharing.cgi存在命令注入漏洞。受影响的产品和版本:D-Link DNS-320L,DNS-325,DNS-327,DNS-340L,D-Link NAS Storage。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
D-LinkDNS-320L 20240403 -
D-LinkDNS-325 20240403 -
D-LinkDNS-327L 20240403 -
D-LinkDNS-340L 20240403 -

II. Public POCs for CVE-2024-3273

#POC DescriptionSource LinkShenlong Link
1D-Link NAS CVE-2024-3273 Exploit Toolhttps://github.com/Chocapikk/CVE-2024-3273POC Details
2Exploit for CVE-2024-3273, supports single and multiple hostshttps://github.com/adhikara13/CVE-2024-3273POC Details
3Quick and dirty honeypot for CVE-2024-3273https://github.com/yarienkiva/honeypot-dlink-CVE-2024-3273POC Details
4Nonehttps://github.com/K3ysTr0K3R/CVE-2024-3273-EXPLOITPOC Details
5D-Link NAS Command Execution Exploithttps://github.com/ThatNotEasy/CVE-2024-3273POC Details
6Nonehttps://github.com/LeopoldSkell/CVE-2024-3273POC Details
7Nonehttps://github.com/mrrobot0o/CVE-2024-3273-POC Details
8Nonehttps://github.com/OIivr/Turvan6rkus-CVE-2024-3273POC Details
9CVE-2024-3273 - D-Link Remote Code Execution (RCE)https://github.com/X-Projetion/CVE-2024-3273-D-Link-Remote-Code-Execution-RCEPOC Details
10Nonehttps://github.com/GSTEINF/CVE-2024-3273POC Details
11UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-3273.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-3273

登录查看更多情报信息。

Same Patch Batch · D-Link · 2024-04-04 · 3 CVEs total

CVE-2024-32729.8 CRITICALD-Link DNS-320L/DNS-325/DNS-327L/DNS-340L HTTP GET Request nas_sharing.cgi hard-coded cred
CVE-2024-32745.3 MEDIUMD-Link DNS-320L/DNS-320LW/DNS-327L HTTP GET Request info.cgi information disclosure

IV. Related Vulnerabilities

V. Comments for CVE-2024-3273

No comments yet


Leave a comment