#VU88210 OS Command Injection in D-Link products - CVE-2024-3273

 

#VU88210 OS Command Injection in D-Link products - CVE-2024-3273

Published: April 8, 2024 / Updated: October 22, 2024


Vulnerability identifier: #VU88210
Vulnerability risk: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red
CVE-ID: CVE-2024-3273
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vulnerable software:
D-Link DNS-320L
D-Link DNS-325
D-Link DNS-327L
D-Link DNS-340L
Software vendor:
D-Link

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation. A remote unauthenticated attacker can send  specially crafted data to the device and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

The affected devices have reached EOL and are no longer supported by the vendor.



External links