First published: Sat Aug 24 2024(Updated: )
A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this vulnerability is the function cgi_s3 of the file /cgi-bin/s3.cgi of the component HTTP POST Request Handler. The manipulation of the argument f_a_key leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Dlink Dns-1550-04 Firmware | ||
D-Link DNS-1550-04 | ||
All of | ||
D-Link DNS-1200-05 Firmware | ||
D-Link DNS-1200-05 | ||
All of | ||
D-Link DNS-1100-4 Firmware | ||
D-Link DNS-1100-4 Firmware | ||
All of | ||
D-Link DNS-726-4 Firmware | ||
D-Link DNS-726-4 Firmware | ||
All of | ||
D-Link DNS-345 Firmware | ||
D-Link DNS-345 | ||
All of | ||
D-Link DNS-343 Firmware | ||
D-Link DNS-343 Firmware | ||
All of | ||
D-Link DNS-340L Firmware | ||
Dlink DNS-340L Firmware | ||
All of | ||
D-Link DNR-326 | ||
D-Link DNR-326 | ||
All of | ||
D-Link DNS-327L Firmware | ||
D-Link DNS-327L | ||
All of | ||
D-Link DNS-326 Firmware | ||
D-Link DNS-326 | ||
All of | ||
D-Link DNS-325 Firmware | ||
Dlink DNS-325 | ||
All of | ||
Dlink Dns-323 Firmware | ||
D-Link DNS-323 | ||
All of | ||
D-Link DNR-322L Firmware | ||
Dlink DNR-322L Firmware | ||
All of | ||
D-Link DNS-321 Firmware | ||
D-Link DNS-321 | ||
All of | ||
Dell DNS-320LW Firmware | ||
Dlink Dns-320lw Firmware | ||
All of | ||
D-Link DNS-320L Firmware | ||
D-Link DNS-320L | ||
All of | ||
D-Link DNS-320 | ||
D-Link DNS-320L | ||
All of | ||
Dell DNS-315L Firmware | ||
D-Link DNS-315L | ||
All of | ||
D-Link DNR-202L | ||
D-Link DNR-202L | ||
All of | ||
Dlink Dns-120 Firmware | ||
D-Link DNS-120 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8130 is classified as a critical vulnerability.
To fix CVE-2024-8130, you should update your D-Link device firmware to the latest version available prior to August 14, 2024.
CVE-2024-8130 affects various D-Link NAS models including DNS-120, DNS-320, and several others.
Yes, CVE-2024-8130 can potentially be exploited remotely, increasing the risk of unauthorized access.
If your D-Link device is affected by CVE-2024-8130, you should immediately apply available firmware updates or mitigate exposure.