First published: Wed Nov 06 2024(Updated: )
A vulnerability classified as problematic has been found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. This affects an unknown part of the file /xml/info.xml of the component HTTP GET Request Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
D-Link DNS-320 | ||
D-Link DNS-320L | ||
All of | ||
Dell DNS-320LW Firmware | ||
Dlink Dns-320lw Firmware | ||
All of | ||
D-Link DNS-325 Firmware | ||
Dlink DNS-325 | ||
All of | ||
D-Link DNS-340L Firmware | ||
Dlink DNS-340L Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10916 is classified as a problematic vulnerability affecting certain D-Link models.
CVE-2024-10916 allows for information disclosure through manipulation of the HTTP GET Request Handler.
CVE-2024-10916 affects D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L with firmware up to 20241028.
To mitigate CVE-2024-10916, it is recommended to update the firmware of the affected D-Link models.
Information disclosure in CVE-2024-10916 means that unauthorized users could potentially access sensitive information from the system.