CVE-2024-8213

A vulnerability classified as critical has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. Affected is the function cgi_FMT_R12R5_1st_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_source_dev leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
Command Injection
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.3 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
VulDBCNA
6.3 MEDIUM
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 64%
VendorProductVersion
dlinkdns-315l_firmware
-
dlinkdns-320lw_firmware
-
dlinkdns-1550-04_firmware
-
dlinkdns-1200-05_firmware
-
dlinkdns-1100-4_firmware
-
dlinkdns-726-4_firmware
-
dlinkdns-345_firmware
-
dlinkdns-343_firmware
-
dlinkdns-340l_firmware
-
dlinkdnr-326_firmware
-
dlinkdns-327l_firmware
-
dlinkdns-326_firmware
-
dlinkdns-325_firmware
-
dlinkdns-323_firmware
-
dlinkdnr-322l_firmware
-
dlinkdns-321_firmware
-
dlinkdns-320l_firmware
-
dlinkdns-320_firmware
-
dlinkdnr-202l_firmware
-
dlinkdns-120_firmware
-
𝑥
= Vulnerable software versions