CVE-2024-8129
24.08.2024, 16:15
A vulnerability, which was classified as critical, was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. Affected is the function cgi_s3_modify of the file /cgi-bin/s3.cgi of the component HTTP POST Request Handler. The manipulation of the argument f_job_name leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
Vendor | Product | Version |
---|---|---|
dlink | dns-1550-04_firmware | - |
dlink | dns-1200-05_firmware | - |
dlink | dns-1100-4_firmware | - |
dlink | dns-726-4_firmware | - |
dlink | dns-345_firmware | - |
dlink | dns-343_firmware | - |
dlink | dns-340l_firmware | - |
dlink | dnr-326_firmware | - |
dlink | dns-327l_firmware | - |
dlink | dns-326_firmware | - |
dlink | dns-325_firmware | - |
dlink | dns-323_firmware | - |
dlink | dnr-322l_firmware | - |
dlink | dns-321_firmware | - |
dlink | dns-320lw_firmware | - |
dlink | dns-320l_firmware | - |
dlink | dns-320_firmware | - |
dlink | dns-315l_firmware | - |
dlink | dnr-202l_firmware | - |
dlink | dns-120_firmware | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.