First published: Thu Aug 15 2024(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. This issue affects the function cgi_del_photo of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument current_path leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Dlink Dns-120 Firmware | ||
D-Link DNS-120 | ||
All of | ||
D-Link DNR-202L | ||
D-Link DNR-202L | ||
All of | ||
Dell DNS-315L Firmware | ||
D-Link DNS-315L | ||
All of | ||
D-Link DNS-320 | ||
D-Link DNS-320L | ||
All of | ||
D-Link DNS-320L Firmware | ||
D-Link DNS-320L | ||
All of | ||
Dell DNS-320LW Firmware | ||
Dlink Dns-320lw Firmware | ||
All of | ||
D-Link DNS-321 Firmware | ||
D-Link DNS-321 | ||
All of | ||
D-Link DNR-322L Firmware | ||
Dlink DNR-322L Firmware | ||
All of | ||
Dlink Dns-323 Firmware | ||
D-Link DNS-323 | ||
All of | ||
D-Link DNS-325 Firmware | ||
Dlink DNS-325 | ||
All of | ||
D-Link DNS-326 Firmware | ||
D-Link DNS-326 | ||
All of | ||
D-Link DNS-327L Firmware | ||
D-Link DNS-327L | ||
All of | ||
D-Link DNR-326 | ||
D-Link DNR-326 | ||
All of | ||
D-Link DNS-340L Firmware | ||
Dlink DNS-340L Firmware | ||
All of | ||
D-Link DNS-343 Firmware | ||
D-Link DNS-343 Firmware | ||
All of | ||
D-Link DNS-345 Firmware | ||
D-Link DNS-345 | ||
All of | ||
D-Link DNS-726-4 Firmware | ||
D-Link DNS-726-4 Firmware | ||
All of | ||
D-Link DNS-1100-4 Firmware | ||
D-Link DNS-1100-4 Firmware | ||
All of | ||
D-Link DNS-1200-05 Firmware | ||
D-Link DNS-1200-05 | ||
All of | ||
Dlink Dns-1550-04 Firmware | ||
D-Link DNS-1550-04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7829 is classified as a critical vulnerability affecting various D-Link devices.
To remediate CVE-2024-7829, it is recommended to update the firmware of the affected D-Link devices to the latest version.
CVE-2024-7829 affects multiple D-Link models including DNS-120, DNS-320, DNR-202L, and others.
Yes, CVE-2024-7829 may allow attackers to exploit the vulnerability remotely.
Users of affected devices should immediately apply firmware updates and review security configurations to mitigate potential risks.