Skip to content

D-Link Critical Vulnerability - 20240410001

Overview

The described vulnerability affects multiple D-Link NAS devices, including models DNS-340L, DNS-320L, DNS-327L, and DNS-325, among others. The vulnerability lies within the nas_sharing.cgi uri, which is vulnerable due to two main issues: a backdoor facilitated by hardcoded credentials, and a command injection vulnerability via the system parameter.

This exploitation could lead to arbitrary command execution on the affected D-Link NAS devices, granting attackers potential access to sensitive information, system configuration alteration, or denial of service, by specifying a command,affecting over 92,000 devices on the Internet.

What is vulnerable?

CVE Severity CVSS Product(s) Affected Exploited Dated
CVE-2024-3273 High 7.3 DNS-320L, DNS-325, DNS-327L and DNS-340L upto 20240403 Yes 11/04/2024
CVE-2024-3272 Critical 9.8 DNS-320L, DNS-325, DNS-327L and DNS-340L upto 20240403 Yes 11/04/2024

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices (refer Patch Management):

Additional References