Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-0717
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
D-Link Good Line Router v2 HTTP GET Request devinfo information disclosure
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability classified as critical was found in D-Link DAP-1360, DIR-300, DIR-615, DIR-615GF, DIR-615S, DIR-615T, DIR-620, DIR-620S, DIR-806A, DIR-815, DIR-815AC, DIR-815S, DIR-816, DIR-820, DIR-822, DIR-825, DIR-825AC, DIR-825ACF, DIR-825ACG1, DIR-841, DIR-842, DIR-842S, DIR-843, DIR-853, DIR-878, DIR-882, DIR-1210, DIR-1260, DIR-2150, DIR-X1530, DIR-X1860, DSL-224, DSL-245GR, DSL-2640U, DSL-2750U, DSL-G2452GR, DVG-5402G, DVG-5402G, DVG-5402GFRU, DVG-N5402G, DVG-N5402G-IL, DWM-312W, DWM-321, DWR-921, DWR-953 and Good Line Router v2 up to 20240112. This vulnerability affects unknown code of the file /devinfo of the component HTTP GET Request Handler. The manipulation of the argument area with the input notice|net|version leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-251542 is the identifier assigned to this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
D-Link多款产品信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
D-Link DIR-816等都是中国友讯(D-Link)公司的产品。DIR-816是一款无线路由器。DIR-882是一款无线路由器。D-Link DAP-136是一款无线网络信号扩展器。 D-Link多款产品存在信息泄露漏洞,该漏洞源于文件/devinfo会导致信息泄露。以下产品受到影响:DIR-825ACG1、DIR-841、DIR-1260、DIR-822、DIR-X1530、DIR-825、DIR-615、DIR-842、DIR-853、DIR-1210、DIR-806A、DIR-815、DSL-
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
D-LinkDAP-1360 20240112 -
D-LinkDIR-300 20240112 -
D-LinkDIR-615 20240112 -
D-LinkDIR-615GF 20240112 -
D-LinkDIR-615S 20240112 -
D-LinkDIR-615T 20240112 -
D-LinkDIR-620 20240112 -
D-LinkDIR-620S 20240112 -
D-LinkDIR-806A 20240112 -
D-LinkDIR-815 20240112 -
D-LinkDIR-815AC 20240112 -
D-LinkDIR-815S 20240112 -
D-LinkDIR-816 20240112 -
D-LinkDIR-820 20240112 -
D-LinkDIR-822 20240112 -
D-LinkDIR-825 20240112 -
D-LinkDIR-825AC 20240112 -
D-LinkDIR-825ACF 20240112 -
D-LinkDIR-825ACG1 20240112 -
D-LinkDIR-841 20240112 -
D-LinkDIR-842 20240112 -
D-LinkDIR-842S 20240112 -
D-LinkDIR-843 20240112 -
D-LinkDIR-853 20240112 -
D-LinkDIR-878 20240112 -
D-LinkDIR-882 20240112 -
D-LinkDIR-1210 20240112 -
D-LinkDIR-1260 20240112 -
D-LinkDIR-2150 20240112 -
D-LinkDIR-X1530 20240112 -
D-LinkDIR-X1860 20240112 -
D-LinkDSL-224 20240112 -
D-LinkDSL-245GR 20240112 -
D-LinkDSL-2640U 20240112 -
D-LinkDSL-2750U 20240112 -
D-LinkDSL-G2452GR 20240112 -
D-LinkDVG-5402G 20240112 -
D-LinkDVG-5402G 20240112 -
D-LinkDVG-5402GFRU 20240112 -
D-LinkDVG-N5402G 20240112 -
D-LinkDVG-N5402G-IL 20240112 -
D-LinkDWM-312W 20240112 -
D-LinkDWM-321 20240112 -
D-LinkDWR-921 20240112 -
D-LinkDWR-953 20240112 -
D-LinkGood Line Router v2 20240112 -
II. Public POCs for CVE-2024-0717
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-0717
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-0717

No comments yet


Leave a comment