First published: Thu Sep 05 2024(Updated: )
A vulnerability, which was classified as problematic, was found in D-Link DNS-320 2.02b01. This affects an unknown part of the file /cgi-bin/discovery.cgi of the component Web Management Interface. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
D-Link DNS-320 | =2.02b01 | |
D-Link DNS-320L |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8461 is classified as problematic due to its potential for information disclosure.
To fix CVE-2024-8461, it is recommended to update the D-Link DNS-320 firmware to the latest version provided by the manufacturer.
CVE-2024-8461 affects the Web Management Interface, specifically the /cgi-bin/discovery.cgi file.
CVE-2024-8461 impacts D-Link DNS-320 devices running firmware version 2.02b01.
CVE-2024-8461 is an information disclosure vulnerability that can potentially expose sensitive information.