从这个网页截图中,可以获取到以下关于漏洞的关键信息: 1. 漏洞编号:#397278 2. 漏洞名称:D-Link DNS 320/320L/321/323/325/327L Command Injection 3. 漏洞描述: - D-Link nas DNS-320/320L/321/323/325/327L all firmware version has a command injection vulnerability in cgi_FMT_Std2R5_2nd_DiskMGR function of the file /cgi-bin/hd_config.cgi. - The variable f_source_dev is passed from a POST request and is assigned to v3 via the sprintf function at line 43 and invoked by the system command, it can lead to command execution. 4. 漏洞来源: - https://github.com/BuaalOTTeam/iot_Dlink_NAS/blob/main/DNS_cgi_FMT_Std2R5_2nd_DiskMGR.md 5. 提交者:BuaaloTTTeam (ID 73348) 6. 提交时间:08/24/2024 04:44 AM (5 days ago) 7. 审核时间:08/27/2024 01:34 PM (3 days later) 8. 状态:Accepted 9. VulDB Entry:275923 这些信息详细描述了漏洞的性质、影响范围、提交者、提交和审核时间,以及漏洞的当前状态。