Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-3273
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
D-Link DNS-320L/DNS-325/DNS-327L/DNS-340L HTTP GET Request nas_sharing.cgi command injection
Source: NVD (National Vulnerability Database)
Vulnerability Description
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
在命令中使用的特殊元素转义处理不恰当(命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
D-Link DNS-320 命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
D-Link DNS-320是中国友讯(D-Link)公司的一款NAS(网络附属存储)设备。 D-Link DNS-320L存在命令注入漏洞,该漏洞源于文件/cgi-bin/nas_sharing.cgi存在命令注入漏洞。受影响的产品和版本:D-Link DNS-320L,DNS-325,DNS-327,DNS-340L,D-Link NAS Storage。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
D-LinkDNS-320L 20240403 -
D-LinkDNS-325 20240403 -
D-LinkDNS-327L 20240403 -
D-LinkDNS-340L 20240403 -
II. Public POCs for CVE-2024-3273
#POC DescriptionSource LinkShenlong Link
1D-Link NAS CVE-2024-3273 Exploit Toolhttps://github.com/Chocapikk/CVE-2024-3273POC Details
2Exploit for CVE-2024-3273, supports single and multiple hostshttps://github.com/adhikara13/CVE-2024-3273POC Details
3Quick and dirty honeypot for CVE-2024-3273https://github.com/yarienkiva/honeypot-dlink-CVE-2024-3273POC Details
4Nonehttps://github.com/K3ysTr0K3R/CVE-2024-3273-EXPLOITPOC Details
5D-Link NAS Command Execution Exploithttps://github.com/ThatNotEasy/CVE-2024-3273POC Details
6Nonehttps://github.com/LeopoldSkell/CVE-2024-3273POC Details
7Nonehttps://github.com/mrrobot0o/CVE-2024-3273-POC Details
8Nonehttps://github.com/OIivr/Turvan6rkus-CVE-2024-3273POC Details
9CVE-2024-3273 - D-Link Remote Code Execution (RCE)https://github.com/X-Projetion/CVE-2024-3273-D-Link-Remote-Code-Execution-RCEPOC Details
10Nonehttps://github.com/GSTEINF/CVE-2024-3273POC Details
11UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-3273.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-3273
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-3273

No comments yet


Leave a comment