Skip to content

Commit

Permalink
Format markdown files
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Apr 10, 2024
1 parent 38a8c92 commit 7fe6b2c
Showing 1 changed file with 5 additions and 5 deletions.
10 changes: 5 additions & 5 deletions docs/advisories/20240410001-D-Link-Critical-Vulnerability.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,15 +2,15 @@

## Overview

The described vulnerability affects multiple D-Link NAS devices, including models DNS-340L, DNS-320L, DNS-327L, and DNS-325, among others. The vulnerability lies within the nas_sharing.cgi uri, which is vulnerable due to two main issues: a backdoor facilitated by hardcoded credentials, and a command injection vulnerability via the system parameter.
The described vulnerability affects multiple D-Link NAS devices, including models DNS-340L, DNS-320L, DNS-327L, and DNS-325, among others. The vulnerability lies within the nas_sharing.cgi uri, which is vulnerable due to two main issues: a backdoor facilitated by hardcoded credentials, and a command injection vulnerability via the system parameter.

This exploitation could lead to arbitrary command execution on the affected D-Link NAS devices, granting attackers potential access to sensitive information, system configuration alteration, or denial of service, by specifying a command,affecting over 92,000 devices on the Internet.

## What is vulnerable?

| CVE | Severity | CVSS | Product(s) Affected |
| --------------------------------------------------------------- | -------- | ---- | ------------------- |
| [CVE-2024-3273](https://nvd.nist.gov/vuln/detail/CVE-2024-3273) | N/A | Not yet rated | **DNS-320L**, **DNS-325**, **DNS-327L** **and** **DNS-340L upto 20240403** |
| CVE | Severity | CVSS | Product(s) Affected |
| --------------------------------------------------------------- | -------- | ------------- | -------------------------------------------------------------------------- |
| [CVE-2024-3273](https://nvd.nist.gov/vuln/detail/CVE-2024-3273) | N/A | Not yet rated | **DNS-320L**, **DNS-325**, **DNS-327L** **and** **DNS-340L upto 20240403** |

## What has been observed?

Expand All @@ -26,4 +26,4 @@ The WA SOC recommends administrators apply the solutions as per vendor instructi

- [Github - dlink](https://github.com/netsecfish/dlink)
- [VulDB](https://vuldb.com/?ctiid.259284)
- [Tenable](https://www.tenable.com/cve/CVE-2024-3273)
- [Tenable](https://www.tenable.com/cve/CVE-2024-3273)

0 comments on commit 7fe6b2c

Please sign in to comment.