Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-10914 PoC — D-Link多款产品 安全漏洞

Source
Associated Vulnerability
Title:D-Link多款产品 安全漏洞 (CVE-2024-10914)
Description:D-Link DNS-320等都是中国友讯(D-Link)公司的一款NAS(网络附属存储)设备。 D-Link多款产品存在安全漏洞,该漏洞源于对参数name的错误操作会导致操作系统命令注入。以下产品及版本受到影响:D-Link DNS-320、DNS-320LW、DNS-325和DNS-340L 20241028版本及之前版本。
Description
CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.
Readme
# CVE-2024-10914: Critical Command Injection Vulnerability in D-Link NAS Devices

## Description
CVE-2024-10914 is a critical command injection vulnerability affecting legacy D-Link Network Attached Storage (NAS) devices. This flaw, with a **CVSS score of 9.2**, allows unauthenticated attackers to execute arbitrary shell commands by exploiting improper input validation in the `cgi_user_add` command. 

The vulnerability can be triggered remotely using a specially crafted HTTP GET request, making it highly exploitable.

## Affected Devices
This vulnerability impacts the following D-Link NAS models:
- **DNS-320**: Firmware version 1.00
- **DNS-320LW**: Version 1.01.0914.2012
- **DNS-325**: Versions 1.01 and 1.02
- **DNS-340L**: Version 1.08

File Snapshot

[4.0K] /data/pocs/b1b5a95194081785d07afd1fe7eb076bd54d21f8 ├── [5.2K] exploit.cpp ├── [1.0K] LICENSE └── [ 749] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.