Overview
- Description
- A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
- Source
- cna@vuldb.com
- NVD status
- Analyzed
Risk scores
CVSS 4.0
- Type
- Secondary
- Base score
- 9.2
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- CRITICAL
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Secondary
- Base score
- 7.6
- Impact score
- 10
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:C/I:C/A:C
Weaknesses
- cna@vuldb.com
- CWE-707
Social media
- Hype score
- Not currently trending
Hackers target critical flaw CVE-2024-10914 in EOL D-Link NAS Devices https://t.co/E8p96yfmEr The exploitation of the recently disclosed ‘won’t fix’ issue CVE-2024-10914 in legacy D-Link NAS devices began days after its disclosure. Days after D-Link announced it wouldn’t p…
@f1tym1
15 Nov 2024
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
You're using outdated D-Link NAS? Then you're a target. CVE-2024-10914 lets attackers run shell commands on your exposed device. D-Link won’t fix it, they already called it dead tech. Retire it or upgrade. Shadowserver saw exploitation begin Nov 12. You're either ready, or done.
@ShepardTerminal
14 Nov 2024
27 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
D-Link製NASデバイスの重大な欠陥が悪用される パッチリリース予定なし:CVE-2024-10914 https://t.co/zZRDAdAN9R #izumino_trend
@sec_trend
14 Nov 2024
28 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Gravi vulnerabilità nei NAS e modem D-Link per assenza di patch su dispositivi EOL Sicurezza Informatica, attacchi informatici, CVE-2024-10914, CVE-2024-11068, cybersecurity, D-Link, dispositivi, DSL6740C, EOL, modem, NAS, vulnerabilità https://t.co/5XJ5iRrdr1 https://t.co/c9UZ72
@matricedigitale
14 Nov 2024
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
【おわり】D-Link社旧式NASの重大(Critical)な脆弱性CVE-2024-10914が悪用され出した。未認証での細工されたGETリクエストによるコマンドインジェクション。Shadowserver報告では11/12から悪用の試行を観測。D−Link社公式によると自動更新や通知機能は無いため打つ手なし。 https://t.co/uFELfHxpX0
@__kokumoto
13 Nov 2024
4542 Impressions
21 Retweets
43 Likes
16 Bookmarks
1 Reply
1 Quote
Actively exploited CVE : CVE-2024-10914
@transilienceai
13 Nov 2024
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
به تازگی برای D-Link network-attached storage (NAS) آسیب پذیری با کد شناسایی CVE-2024-10914 منتشر شده است. نمره این آسیب پذیری 9.2 بوده و اکسپلویت آن نیز به صورت عمومی در دسترس می باشد. این آسیب پذیری باعث اجرای command یا همان command execution می شود. https://t.co/Y2P1U3epiq
@AmirHossein_sec
13 Nov 2024
31 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Aumento explotación de inyección de comandos en D-Link NAS CVE-2024-10914 ↪️/cgi-bin/account_mgr.cgi https://t.co/2roCyKzZhS https://t.co/Zb67TMM3Qe
@elhackernet
13 Nov 2024
2355 Impressions
8 Retweets
24 Likes
2 Bookmarks
0 Replies
0 Quotes
We have observed D-Link NAS CVE-2024-10914 /cgi-bin/account_mgr.cgi command injection exploitation attempts starting Nov 12th. This vuln affects EOL/EOS devices, which should be removed from the Internet: https://t.co/o2BsBwkIlI We see ~1100 exposed. https://t.co/0ZhIHSXqVZ ht
@Shadowserver
13 Nov 2024
2097 Impressions
12 Retweets
24 Likes
6 Bookmarks
1 Reply
0 Quotes
Attenzione: Oltre 60.000 dispositivi NAS D-Link colpiti da una pericolosa vulnerabilità (CVE-2024-10914, punteggio CVSS 9.2)! I modelli DNS-320, DNS-320LW, DNS-325 e DNS-340L sono esposti a iniezioni di comandi tramite una lacuna nella sicurezza. D-Link non rilascerà patch… https
@cyber_net_now
12 Nov 2024
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
友讯(D-Link)确认不会修复高危漏洞CVE-2024-10914,影响逾6万台旧型号NAS设备。公司已停止支持这些设备,建议用户退役或脱离公网。你认为厂商应对旧设备的安全漏洞负责吗? https://t.co/yn28JPDAh2 https://t.co/fHD5JSNLzQ
@maxiujun
12 Nov 2024
39 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Cost savings are not always good, in fact injurious to cyber security, when preferred over retiring old IT assets D-Link announced 20NAS Models End-of-Life End-of-Service CVE-2024-10914 Command Injection Vulnerability #CyberSec #hacking #vapt #dlink https://t.co/ymU72B142p
@cysdat
12 Nov 2024
66 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
1 Quote
DIGITAL GRAVEYARD ALERT: 60k+ D-Link NAS devices dance with doom! Critical flaw (CVE-2024-10914) lets ANYONE inject shell commands. No fix coming - it's abandon ship or sail the dangerous seas! 🏴☠️ #cybersecurity #infosec https://t.co/zUNZZUazUo
@geeknik
12 Nov 2024
80 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
D-Link won’t fix critical flaw affecting 60,000 older NAS devices: https://t.co/27a1x7I0oz More than 60,000 D-Link NAS devices are vulnerable to a critical command injection flaw (CVE-2024-10914) with a severity score of 9.2. The vulnerability allows unauthenticated attackers to
@securityRSS
11 Nov 2024
20 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
D-Link won’t fix critical flaw affecting 60,000 older end-of-life NAS devices. The flaw, tracked as CVE-2024-10914, has a critical 9.2 severity score with a publicly available exploit. https://t.co/9G7mlnPjxH https://t.co/Fs0OU3pAJb
@riskigy
11 Nov 2024
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
D-Link社のNAS6万台以上に影響する重大(Critical)な脆弱は修正されない。公式発表。保守期限切れ(EoL)のため。CVE-2024-10914はCVSSスコア9.2で、細工されたHTTP GETによるコマンドインジェクション。FOFA読みでは92,589台が露出。 https://t.co/znEoSpBGet
@__kokumoto
11 Nov 2024
2958 Impressions
23 Retweets
17 Likes
7 Bookmarks
0 Replies
1 Quote
csirt_it: ‼ #DLink: disponibile un #PoC per lo sfruttamento della CVE-2024-10914 che interessa alcuni modelli di #NAS Rischio: 🔴 Tipologia: 🔸 Arbitrary Code Execution 🔗 https://t.co/0x7MsTY3O5 ⚠ Importante mantenere aggiornati i sistemi https://t.co/963N3xK2Hk
@Vulcanux_
11 Nov 2024
53 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#exploit 1. CVE-2024-49681: WP Sessions Time Monitoring Full Automatic <=1.0.9 - Unauthenticated SQLI https://t.co/TqXahOZAcq 2. CVE-2024-10914: D-Link NAS Command Injection https://t.co/p3RvTxYpCf 3. CVE-2024-50483: WP Meetup 0.1 Authentication Bypass https://t.co/95eOMb0bx
@ksg93rd
10 Nov 2024
71 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-10914 : D-Link won’t fix critical flaw affecting 60,000 older NAS devices GET /cgi-bin/account_mgr.cgi?cmd=cgi_user_add&name=%27;<INJECTED_SHELL_COMMAND>;%27 https://t.co/3wqK4ZKryc
@freedomhack101
10 Nov 2024
70 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
#exploit 1. CVE-2024-49681: WP Sessions Time Monitoring Full Automatic <=1.0.9 - Unauthenticated SQLI https://t.co/NEXFvOrbMh 2. CVE-2024-10914: D-Link NAS Command Injection https://t.co/ZTSIUmY2Xy 3. CVE-2024-50483: WP Meetup 0.1 Authentication Bypass https://t.co/IIdHn4fAd
@akaclandestine
10 Nov 2024
1360 Impressions
3 Retweets
12 Likes
10 Bookmarks
0 Replies
0 Quotes
CVE-2024-10914 is rated at a CVSS score of 9.2. It affects the following @Dlink-branded NAS devices that are commonly used by small businesses: •DNS-320 Version 1.00 •DNS-320LW Version 1.01.0914.2012 •DNS-325 Version 1.01, Version 1.02 •DNS-340L Version 1.08 As of this… https:
@Sujeet
10 Nov 2024
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10914 (Published: 2024-11-06) affects D-Link products. Vulnerable versions are at risk of exploitation. To safeguard your systems, ensure you update to the latest firmware and apply all security patches. Stay secure! 🔒 More info: https://t.co/XiniVtuLec… https://t.co
@transilienceai
9 Nov 2024
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10914 (Published: 2024-11-06) affects D-Link devices. Exploited versions include several models vulnerable to unauthorized access. 🔒 Remediation: Update to the latest firmware available on the D-Link support page. Stay secure! More info: https://t.co/XiniVtuLec… http
@transilienceai
9 Nov 2024
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10914 (Published: 2024-11-06) affects D-Link products. Vulnerable versions are at risk of exploitation. To protect your systems, ensure you update to the latest firmware and apply all recommended security patches. Stay secure! 🔒 More info: https://t.co/XiniVtuLec… ht
@transilienceai
9 Nov 2024
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10914 (Published: 2024-11-06) affects D-Link products. Vulnerable versions include several models that could be exploited. To safeguard your systems, ensure you update to the latest firmware and follow D-Link's remediation guidelines. Stay secure! 🔒 More info:… https
@transilienceai
9 Nov 2024
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10914 (Published: 2024-11-06) - A critical command injection vulnerability affects D-Link NAS devices. Exploited versions include specific models. Remediation: Update to the latest firmware immediately to secure your device. More info: https://t.co/hcJJh0m2bt… https:/
@transilienceai
9 Nov 2024
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10914 (Published: 2024-11-06) - A critical command injection vulnerability has been discovered in D-Link NAS devices. Affects specific versions. Remediation is crucial! For detailed info and mitigation steps, check out: https://t.co/hcJJh0m2bt #CyberSecurity #DLink
@transilienceai
9 Nov 2024
28 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10914 (Published: 2024-11-06) - A critical command injection vulnerability affects D-Link NAS devices. Exploited versions include specific models vulnerable through the 'name' parameter. Remediation is essential! Check the details here: https://t.co/hcJJh0m2bt… https:
@transilienceai
9 Nov 2024
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10914 (Published: 2024-11-06) - A critical command injection vulnerability affects D-Link NAS devices. Ensure your systems are updated to the latest firmware to mitigate risks. For detailed remediation steps, check out the full report: https://t.co/hcJJh0m2bt… https:/
@transilienceai
9 Nov 2024
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10914 (Published: 2024-11-06) - A critical command injection vulnerability affects D-Link NAS devices. Ensure your systems are updated to the latest firmware to mitigate risks. For detailed remediation steps, check out the full report: https://t.co/hcJJh0m2bt… https:/
@transilienceai
9 Nov 2024
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
D-Link no reparará un fallo crítico que afecta a 60.000 dispositivos NAS antiguos ℹ️ CVE-2024-10914 ➡️ curl "http://[Target-IP]/cgi-bin/account_mgr.cgi cmd=cgi_user_add&name=%27;<INJECTED_SHELL_COMMAND>;%27" https://t.co/elm9iVCvgI https://t.co/MuBWYT4uKc
@elhackernet
9 Nov 2024
5707 Impressions
32 Retweets
87 Likes
20 Bookmarks
0 Replies
1 Quote
cve-2024-10914 GET /cgi-bin/account_mgr.cgi?cmd=cgi_user_add&name=%27;<INJECTED_SHELL_COMMAND>;%27 FOFA:app =D_Link-DNS-ShareCenter #exploit #poc #IoT https://t.co/7Hbk6csKS4
@akaclandestine
9 Nov 2024
25083 Impressions
61 Retweets
367 Likes
226 Bookmarks
15 Replies
6 Quotes
D-Link NAS Devices affected by a Critical flaw CVE-2024-10914 #DLink #NasDevice #CVE-2024-10914 https://t.co/qmU592KvY7
@pravin_karthik
9 Nov 2024
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10914 (CVSS 9.2): Command Injection Flaw Threatens 61,000+ D-Link NAS Devices A critical command injection flaw (CVSS 9.2) threatens 61,000+ D-Link NAS devices. If you're using DNS-320, DNS-320LW, DNS-325, or DNS-340L, read on. Sensitive data could be at risk! The…
@Ransom_DB
8 Nov 2024
51 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️⚠️ CVE-2024-10914 (CVSS 9.2): Command Injection Flaw in D-Link NAS Devices 🎯61k+ Results are found on the https://t.co/pb16tGYaKe nearly year. 🔗FOFA Link:https://t.co/BXt3b0Hlx2 FOFA Query:app="D_Link-DNS-ShareCenter" 🔖Refer: https://t.co/eQOUCUrHEx https://t.co/HFPHbmxT
@fofabot
8 Nov 2024
1699 Impressions
11 Retweets
29 Likes
22 Bookmarks
0 Replies
0 Quotes
D-Link社NASに重大(Critical)な脆弱性。CVE-2024-10914はCVSSv4スコア9.2のコマンドインジェクション脆弱性。CGIスクリプトにおける無害化処理の不備により、未認証の攻撃者が細工されたGETリクエストにより任意コマンドを実行可能。 https://t.co/CVEDZWUw1l
@__kokmt
8 Nov 2024
1707 Impressions
0 Retweets
5 Likes
3 Bookmarks
0 Replies
1 Quote
CVE-2024-10914 Critical Remote OS Command Injection in D-Link DNS Devices A critical vulnerability exists in D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L up to version 20241028. The issue affects the cgi_user... https://t.co/zsdZmyvaUc
@VulmonFeeds
6 Nov 2024
60 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-10914: CRITICAL] Critical vulnerability found in D-Link DNS devices up to 20241028 allows remote OS command injection via manipulation of cgi_user_add function. Public exploit disclosed.#cybersecurity,#vulnerability https://t.co/sFKh1ejBp3 https://t.co/qSSuKU9Vz4
@CveFindCom
6 Nov 2024
53 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dns-320_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF9EF6EB-E5C9-4FE5-9C10-DF206851B226" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A0F5355E-F68D-49FE-9793-1FD9BD9AF3E1" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dns-320lw_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6EDFB59-D39F-4BE6-99F4-3CFA32F1DFD0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dns-320lw:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "45467ABC-BAA9-4EB0-9F97-92E31854CA8B" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dns-325_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE94B910-8C2C-43FE-84A2-43E36C1B77F8" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dns-325:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8042169D-D9FA-4BD6-90D1-E0DE269E42B9" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dns-340l_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC1D7741-D299-4CEF-9053-B90C0D2E0B0D" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dns-340l:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0646B20C-5642-4CEA-A96C-7E82AD94A281" } ], "operator": "OR" } ], "operator": "AND" } ]