# D-Link DNS-320/DNS-320LW/DNS-325/DNS-340L account_mgr.cgi cgi_user_add os 命令注入漏洞
## 概述
D-Link 设备 DNS-320, DNS-320LW, DNS-325 和 DNS-340L 中发现了一个关键漏洞,该漏洞导致操作系统命令注入。
## 影响版本
- 20241028 及之前版本
## 细节
- 影响文件: `/cgi-bin/account_mgr.cgi?cmd=cgi_user_add`
- 漏洞函数: `cgi_user_add`
- 漏洞触发: 通过对 `group` 参数的操纵,导致操作系统命令注入
- 攻击方式: 远程攻击
- 攻击复杂度: 高
- 利用难度: 高
## 影响
- 攻击者可以远程利用此漏洞进行操作系统命令注入。
- 利用方法已公开,可能被广泛利用。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been rated as critical. Affected by this issue is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument group leads to os command injection. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-10915.yaml | POC详情 |
标题: Smart Home, SMB and Enterprise solutions | D-Link -- 🔗来源链接
标签: product
标题: CVE-2024-10915 D-Link DNS-320/DNS-320LW/DNS-325/DNS-340L account_mgr.cgi cgi_user_add os command injection -- 🔗来源链接
标签: signature permissions-required
神龙速读标题: CVE-2024-10915 D-Link DNS-320/DNS-320LW/DNS-325/DNS-340L account_mgr.cgi cgi_user_add os command injection -- 🔗来源链接
标签: vdb-entry technical-description
神龙速读标题: Submit #432848: D-Link DNS-320, DNS-320LW, DNS-325, DNS-340L Version 1.00, Version 1.01.0914.2012, Version 1.01, Version 1.02, Version 1.08 OS Command Injection -- 🔗来源链接
标签: third-party-advisory
神龙速读