#VU88209 Use of hard-coded credentials in D-Link products - CVE-2024-3272

 

#VU88209 Use of hard-coded credentials in D-Link products - CVE-2024-3272

Published: April 8, 2024 / Updated: April 11, 2024


Vulnerability identifier: #VU88209
Vulnerability risk: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red
CVE-ID: CVE-2024-3272
CWE-ID: CWE-798
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vulnerable software:
D-Link DNS-320L
D-Link DNS-325
D-Link DNS-327L
D-Link DNS-340L
Software vendor:
D-Link

Description

The vulnerability allows a remote attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code. A remote unauthenticated attacker can access the affected device using the hard-coded credentials.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

The affected devices have reached EOL and are no longer supported by the vendor.



External links