First published: Thu Apr 04 2024(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link Multiple NAS Devices | ||
All of | ||
Any of | ||
D-Link DNS-320L Firmware | =1.01.0702.2013 | |
D-Link DNS-320L Firmware | =1.03.0904.2013 | |
D-Link DNS-320L Firmware | =1.11 | |
D-Link DNS-320L | ||
All of | ||
Dlink Dns-120 Firmware | ||
D-Link DNS-120 | ||
All of | ||
D-Link DNR-202L | ||
D-Link DNR-202L | ||
All of | ||
Dell DNS-315L Firmware | ||
D-Link DNS-315L | ||
All of | ||
D-Link DNS-320 | ||
D-Link DNS-320L | ||
All of | ||
Dell DNS-320LW Firmware | ||
Dlink Dns-320lw Firmware | ||
All of | ||
D-Link DNS-321 Firmware | ||
D-Link DNS-321 | ||
All of | ||
D-Link DNR-322L Firmware | ||
Dlink DNR-322L Firmware | ||
All of | ||
Dlink Dns-323 Firmware | ||
D-Link DNS-323 | ||
All of | ||
D-Link DNS-325 Firmware | =1.01 | |
Dlink DNS-325 | ||
All of | ||
D-Link DNS-326 Firmware | ||
D-Link DNS-326 | ||
All of | ||
Any of | ||
D-Link DNS-327L Firmware | =1.00.0409.2013 | |
D-Link DNS-327L Firmware | =1.09 | |
D-Link DNS-327L | ||
All of | ||
D-Link DNR-326 | ||
D-Link DNR-326 | ||
All of | ||
D-Link DNS-340L Firmware | =1.08 | |
Dlink DNS-340L Firmware | ||
All of | ||
D-Link DNS-343 Firmware | ||
D-Link DNS-343 Firmware | ||
All of | ||
D-Link DNS-345 Firmware | ||
D-Link DNS-345 | ||
All of | ||
D-Link DNS-726-4 Firmware | ||
D-Link DNS-726-4 Firmware | ||
All of | ||
D-Link DNS-1100-4 Firmware | ||
D-Link DNS-1100-4 Firmware | ||
All of | ||
D-Link DNS-1200-05 Firmware | ||
D-Link DNS-1200-05 | ||
All of | ||
Dlink Dns-1550-04 Firmware | ||
D-Link DNS-1550-04 |
This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3273 is classified as a critical vulnerability affecting various D-Link NAS devices.
CVE-2024-3273 affects D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L devices with firmware versions up to 20240403.
To fix CVE-2024-3273, users should update their D-Link NAS device firmware to the latest available version.
CVE-2024-3273 is a remote code execution vulnerability in the HTTP GET request handler of affected D-Link NAS devices.
Yes, CVE-2024-3273 can be exploited remotely, allowing attackers to gain unauthorized access to impacted devices.