D-Link will kritischen Fehler, der 60.000 ältere NAS-Geräte betrifft, nicht beheben

Teilen:

More than 60,000 D-Link network-attached storage devices that have reached end-of-life are vulnerable to a command injection vulnerability with a publicly available exploit.

The flaw, tracked as CVE-2024-10914, has a critical 9.2 severity score and is present in the ‘cgi_user_add’ command where the name parameter is insufficiently sanitized.

An unauthenticated attacker could exploit it to inject arbitrary shell commands by sending specially crafted HTTP GET requests to the devices.

The flaw impacts multiple models of D-Link network-attached storage (NAS) devices that are commonly used by small businesses:

  • DNS-320 Version 1.00
  • DNS-320LW Version 1.01.0914.2012
  • DNS-325 Version 1.01,  Version 1.02
  • DNS-340L Version 1.08

In a technical write-up that provides exploit details, security researcher Netsecfish says that leveraging the vulnerability requires sending “a crafted HTTP GET request to the NAS device with malicious input in the name parameter.”

curl "https://[Target-IP]/cgi-bin/account_mgr.cgi cmd=cgi_user_add&name=%27;<INJECTED_SHELL_COMMAND>;%27" 

“This curl request constructs a URL that triggers the cgi_user_add command with a name parameter that includes an injected shell command,” the researcher explains.

In a security bulletin today, D-Link has confirmed that a fix for CVE-2024-10914 is not coming and the vendor recommends that users retire vulnerable products.

If that is not possible at the moment, users should at least isolate them from the public internet or place them under stricter access conditions.

The same researcher discovered in April this year an arbitrary command injection and hardcoded backdoor flaw, tracked as CVE-2024-3273, impacting mostly the same D-Link NAS models as the latest flaw.

Back then, FOFA internet scans returned 92,589 results.

Responding to the situation at the time, a D-Link spokesperson told BleepingComputer that the networking firm no longer makes NAS devices, and the impacted products had reached EoL and will not be receiving security updates.

Bill Toulas

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
7:01 am, Feb. 2, 2025
Wetter-Symbol 0°C
L: -1° | H: 1°
klarer Himmel
Luftfeuchtigkeit: 95 %
Druck: 1021 mb
Wind: 7 mph E
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 10%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 7:37 am
Sonnenuntergang: 4:51 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
-1° | 1°°C 0 mm 0% 7 mph 89 % 1025 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
3° | 9°°C 0 mm 0% 8 mph 91 % 1025 mb 0 mm/h
Di. Feb. 04 9:00 pm
Wetter-Symbol
6° | 9°°C 1 mm 100% 13 mph 93 % 1026 mb 0 mm/h
Mi. Feb. 05 9:00 pm
Wetter-Symbol
4° | 7°°C 0 mm 0% 10 mph 86 % 1045 mb 0 mm/h
Do. Feb. 06 9:00 pm
Wetter-Symbol
2° | 8°°C 0 mm 0% 8 mph 86 % 1045 mb 0 mm/h
Today 9:00 am
Wetter-Symbol
1° | 3°°C 0 mm 0% 5 mph 89 % 1022 mb 0 mm/h
Today 12:00 pm
Wetter-Symbol
5° | 7°°C 0 mm 0% 7 mph 73 % 1023 mb 0 mm/h
Today 3:00 pm
Wetter-Symbol
8° | 8°°C 0 mm 0% 7 mph 56 % 1022 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
5° | 5°°C 0 mm 0% 4 mph 74 % 1023 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
4° | 4°°C 0 mm 0% 4 mph 79 % 1025 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
3° | 3°°C 0 mm 0% 4 mph 79 % 1025 mb 0 mm/h
Tomorrow 3:00 am
Wetter-Symbol
3° | 3°°C 0 mm 0% 4 mph 86 % 1025 mb 0 mm/h
Tomorrow 6:00 am
Wetter-Symbol
4° | 4°°C 0 mm 0% 4 mph 86 % 1025 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€96,790.55
-2.03%
Ethereum(ETH)
€3,011.76
-5.13%
XRP(XRP)
€2.81
-4.46%
Fesseln(USDT)
€0.96
0.00%
Solana(SOL)
€205.40
-7.96%
USDC(USDC)
€0.96
0.01%
Dogecoin(DOGE)
€0.293669
-7.08%
Shiba Inu(SHIB)
€0.000017
-7.78%
Pepe(PEPE)
€0.000012
-9.36%
Nach oben scrollen