Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-3273 PoC — D-Link DNS-320 命令注入漏洞

Source
Associated Vulnerability
Title:D-Link DNS-320 命令注入漏洞 (CVE-2024-3273)
Description:D-Link DNS-320是中国友讯(D-Link)公司的一款NAS(网络附属存储)设备。 D-Link DNS-320L存在命令注入漏洞,该漏洞源于文件/cgi-bin/nas_sharing.cgi存在命令注入漏洞。受影响的产品和版本:D-Link DNS-320L,DNS-325,DNS-327,DNS-340L,D-Link NAS Storage。
Readme
# CVE-2024-3273-
File Snapshot

[4.0K] /data/pocs/3a48d3966b10a93a6c4d2bb8028b97ad4ac97c29 ├── [ 0] @2.85.161.224 ├── [5.6K] exploite.py ├── [ 16] README.md └── [ 75] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.