First published: Sat Aug 24 2024(Updated: )
A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been declared as critical. This vulnerability affects the function cgi_FMT_R5_SpareDsk_DiskMGR of the file /cgi-bin/hd_config.cgi of the component HTTP POST Request Handler. The manipulation of the argument f_source_dev leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Dlink Dns-1550-04 Firmware | ||
D-Link DNS-1550-04 | ||
All of | ||
D-Link DNS-1200-05 Firmware | ||
D-Link DNS-1200-05 | ||
All of | ||
D-Link DNS-1100-4 Firmware | ||
D-Link DNS-1100-4 Firmware | ||
All of | ||
D-Link DNS-726-4 Firmware | ||
D-Link DNS-726-4 Firmware | ||
All of | ||
D-Link DNS-345 Firmware | ||
D-Link DNS-345 | ||
All of | ||
D-Link DNS-343 Firmware | ||
D-Link DNS-343 Firmware | ||
All of | ||
D-Link DNS-340L Firmware | ||
Dlink DNS-340L Firmware | ||
All of | ||
D-Link DNR-326 | ||
D-Link DNR-326 | ||
All of | ||
D-Link DNS-327L Firmware | ||
D-Link DNS-327L | ||
All of | ||
D-Link DNS-326 Firmware | ||
D-Link DNS-326 | ||
All of | ||
D-Link DNS-325 Firmware | ||
Dlink DNS-325 | ||
All of | ||
Dlink Dns-323 Firmware | ||
D-Link DNS-323 | ||
All of | ||
D-Link DNR-322L Firmware | ||
Dlink DNR-322L Firmware | ||
All of | ||
D-Link DNS-321 Firmware | ||
D-Link DNS-321 | ||
All of | ||
Dell DNS-320LW Firmware | ||
Dlink Dns-320lw Firmware | ||
All of | ||
D-Link DNS-320L Firmware | ||
D-Link DNS-320L | ||
All of | ||
D-Link DNS-320 | ||
D-Link DNS-320L | ||
All of | ||
Dell DNS-315L Firmware | ||
D-Link DNS-315L | ||
All of | ||
D-Link DNR-202L | ||
D-Link DNR-202L | ||
All of | ||
Dlink Dns-120 Firmware | ||
D-Link DNS-120 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8133 has been declared as critical due to its potential to allow unauthorized access to affected D-Link devices.
To fix CVE-2024-8133, users should update their D-Link devices to the latest firmware version released after August 14, 2024.
CVE-2024-8133 affects various D-Link models including DNS-120, DNS-320, and DNR-202L among others.
The risks include unauthorized access to sensitive data and potential control over the affected devices.
Currently, there are no recommended workarounds for CVE-2024-8133 other than updating to the fixed firmware.