Vulnerabilites related to dell - dns-320lw_firmware
Vulnerability from fkie_nvd
Published
2024-08-19 15:15
Modified
2024-08-20 16:20
Severity ?
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this issue is the function cgi_audio_search/cgi_create_playlist/cgi_get_album_all_tracks/cgi_get_alltracks_editlist/cgi_get_artist_all_album/cgi_get_genre_all_tracks/cgi_get_tracks_list/cgi_set_airplay_content/cgi_write_playlist of the file /cgi-bin/myMusic.cgi. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
References
▼ | URL | Tags | |
---|---|---|---|
cna@vuldb.com | https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_create_playlist.md | Exploit | |
cna@vuldb.com | https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_get_tracks_list.md | Exploit | |
cna@vuldb.com | https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383 | Vendor Advisory | |
cna@vuldb.com | https://vuldb.com/?ctiid.275108 | Permissions Required, VDB Entry | |
cna@vuldb.com | https://vuldb.com/?id.275108 | Permissions Required, VDB Entry | |
cna@vuldb.com | https://vuldb.com/?submit.391669 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dell | dns-120_firmware | - | |
dell | dns-120 | - | |
dell | dnr-202l_firmware | - | |
dell | dnr-202l | - | |
dell | dns-315l_firmware | - | |
dell | dns-315l | - | |
dell | dns-320_firmware | - | |
dell | dns-320 | - | |
dell | dns-320l_firmware | - | |
dell | dns-320l | - | |
dell | dns-320lw_firmware | - | |
dell | dns-320lw | - | |
dell | dns-321_firmware | - | |
dell | dns-321 | - | |
dell | dnr-322l_firmware | - | |
dell | dnr-322l | - | |
dell | dns-323_firmware | - | |
dell | dns-323 | - | |
dell | dns-325_firmware | - | |
dell | dns-325 | - | |
dell | dns-326_firmware | - | |
dell | dns-326 | - | |
dell | dns-327l_firmware | - | |
dell | dns-327l | - | |
dell | dnr-326_firmware | - | |
dell | dnr-326 | - | |
dell | dns-340l_firmware | - | |
dell | dns-340l | - | |
dell | dns-343_firmware | - | |
dell | dns-343 | - | |
dell | dns-345_firmware | - | |
dell | dns-345 | - | |
dell | dns-726-4_firmware | - | |
dell | dns-726-4 | - | |
dell | dns-1100-4_firmware | - | |
dell | dns-1100-4 | - | |
dell | dns-1200-05_firmware | - | |
dell | dns-1200-05 | - | |
dell | dns-1550-04_firmware | - | |
dell | dns-1550-04 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B21A28B5-28EC-4307-938D-DFBEDB554DE5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-120:-:*:*:*:*:*:*:*", "matchCriteriaId": "577E4A7A-E036-4154-824A-ABBDF7B51D80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dnr-202l_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39244DF3-C362-419D-A6FF-1B8D8B716F97", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dnr-202l:-:*:*:*:*:*:*:*", "matchCriteriaId": "F99805E4-E7D7-40D4-9340-1CCE337456FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-315l_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0B1A621-3FE4-4C9B-9082-2DA311BCA88B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-315l:-:*:*:*:*:*:*:*", "matchCriteriaId": "7305E3CF-55F2-4885-BB74-FC0607D1DEF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B532E-DC78-496E-B362-6E09A2C3B209", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-320:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE7B6061-1B5E-47C7-981E-103C8532A5F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-320l_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FF8C361-252B-4D72-923A-3F1EE660904C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-320l:-:*:*:*:*:*:*:*", "matchCriteriaId": "691EDA1F-77F4-4448-A6FE-AC280D8A1C84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-320lw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "92854E27-F1C7-42A4-91B0-D12EE805A191", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-320lw:-:*:*:*:*:*:*:*", "matchCriteriaId": "49987828-78FF-4571-8382-5CE15EDC8092", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-321_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "12F66A8B-4985-4F6F-BECB-74A7D53FE5EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-321:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F2B198D-7991-4B8C-981F-40DE5C948140", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dnr-322l_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED124802-3717-4D45-AE2B-ECE20876FB22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dnr-322l:-:*:*:*:*:*:*:*", "matchCriteriaId": "908FF5BC-9EA8-476E-BB3B-5B839C4855CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-323_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EA2156D-ED3B-4E4E-9E22-A8AC6B12CAE8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-323:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD4C6779-9E57-4B64-BE79-356046955B42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-325_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "574481BB-B541-4B84-A935-64EB872100F9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-325:-:*:*:*:*:*:*:*", "matchCriteriaId": "77CFAE33-FB2C-4239-8674-F19A8628A3A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-326_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "151E7B4E-F2CD-4090-BA3F-721B85B7EA70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-326:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E8D94FF-81FA-43BC-AA9A-6DDD578060C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-327l_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37C7B7F4-E654-47A7-8541-B49CD2F76A80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-327l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2CDA9CA-7092-4090-AC15-7641A8E268F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dnr-326_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D935868-7250-4E4A-AE30-FE383023DC03", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dnr-326:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DE48A4B-7F22-4EE3-9842-A9BDEBC11058", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-340l_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85430BEE-D18E-4BC9-BE72-04440857E205", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-340l:-:*:*:*:*:*:*:*", "matchCriteriaId": "B88232B8-047D-496A-B14E-138BEEB64984", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-343_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ABA04D-D603-4ACF-B165-F94A91920803", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-343:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1B2DBDA-C357-41B5-BDEF-9855A8042E2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-345_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B49595DE-4CE1-445B-B750-68615A80A8DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-345:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4AF004B-2BA8-4EE4-81AE-5A4F635059C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-726-4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA638D44-7851-4999-804F-EEFFA98D6E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-726-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "423AD338-46E1-4B73-8974-C2DA4E47240C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-1100-4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E919D37-0C27-45F9-922B-1E65983FDBA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-1100-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AABE548-E243-4237-9225-38A5FFCD829F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-1200-05_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "65DB23C2-7FB0-48B8-BED6-0896B2B18D7E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-1200-05:-:*:*:*:*:*:*:*", "matchCriteriaId": "A62D373D-60A7-41A5-B66B-418B97A9BA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:dns-1550-04_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4EACE54-DE9E-4602-80C7-5121CFDAA616", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:dns-1550-04:-:*:*:*:*:*:*:*", "matchCriteriaId": "0561471D-6B18-43C9-B65B-32B6065275B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", "tags": [ "unsupported-when-assigned" ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this issue is the function cgi_audio_search/cgi_create_playlist/cgi_get_album_all_tracks/cgi_get_alltracks_editlist/cgi_get_artist_all_album/cgi_get_genre_all_tracks/cgi_get_tracks_list/cgi_set_airplay_content/cgi_write_playlist of the file /cgi-bin/myMusic.cgi. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced." }, { "lang": "es", "value": "Se encontr\u00f3 una vulnerabilidad en D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS- 326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 y DNS-1550-04 hasta 20240814 y clasificados como cr\u00edtico. Afectado por este problema es la funci\u00f3n CGI_AUDIO_SEARCH/CGI_CREATE_PLAYLIST/CGI_GET_ALBUM_ALL_TRACKS/CGI_GET_ALLTRACKS_EDITLIST/CGI_GET_ARTIST_ALL_ALBUM/CGI_GET_GENRE_ALL_TRACKS/CGI_GET_TRACKS/CGGI ite_playList del archivo /cgi-bin/mymusic.cgi. La manipulaci\u00f3n conduce a la inyecci\u00f3n de comandos. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante. NOTA: Se contact\u00f3 primeramente con el proveedor y se confirm\u00f3 que el producto ha llegado al final de su vida \u00fatil. Deber\u00eda retirarse y reemplazarse." } ], "id": "CVE-2024-7922", "lastModified": "2024-08-20T16:20:25.403", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "automatable": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "recovery": "NOT_DEFINED", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnerabilityResponseEffort": "NOT_DEFINED", "vulnerableSystemAvailability": "LOW", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "LOW" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }, "published": "2024-08-19T15:15:09.403", "references": [ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_create_playlist.md" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_get_tracks_list.md" }, { "source": "cna@vuldb.com", "tags": [ "Vendor Advisory" ], "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.275108" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?id.275108" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.391669" } ], "sourceIdentifier": "cna@vuldb.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "cna@vuldb.com", "type": "Primary" } ] }
cve-2024-7922
Vulnerability from cvelistv5
Published
2024-08-19 15:00
Modified
2024-08-19 18:23
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this issue is the function cgi_audio_search/cgi_create_playlist/cgi_get_album_all_tracks/cgi_get_alltracks_editlist/cgi_get_artist_all_album/cgi_get_genre_all_tracks/cgi_get_tracks_list/cgi_set_airplay_content/cgi_write_playlist of the file /cgi-bin/myMusic.cgi. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.275108 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.275108 | signature, permissions-required | |
https://vuldb.com/?submit.391669 | third-party-advisory | |
https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_create_playlist.md | exploit | |
https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383 | related | |
https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_get_tracks_list.md | related |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | D-Link | DNS-120 |
Version: 20240814 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:dlink:dns-120_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-120_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dnr-202l_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dnr-202l_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-315l_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-315l_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-320_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-320_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-320l_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-320l_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-320lw_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-320lw_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-321_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-321_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dnr-322l_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dnr-322l_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-323_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-323_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-325_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-325_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-326_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-326_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-327l_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-327l_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dnr-326_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dnr-326_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-340l_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-340l_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-343_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-343_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-345_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-345_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-726-4_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-726-4_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-1100-4_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-1100-4_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-1200-05_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-1200-05_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "cpes": [ "cpe:2.3:o:dlink:dns-1550-04_firmware:20240814:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dns-1550-04_firmware", "vendor": "dlink", "versions": [ { "status": "affected", "version": "20240814" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-7922", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-19T18:05:19.786796Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-19T18:23:40.353Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "DNS-120", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNR-202L", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-315L", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-320", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-320L", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-320LW", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-321", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNR-322L", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-323", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-325", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-326", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-327L", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNR-326", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-340L", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-343", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-345", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-726-4", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-1100-4", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-1200-05", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] }, { "product": "DNS-1550-04", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "20240814" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "BuaaI0TTeam (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this issue is the function cgi_audio_search/cgi_create_playlist/cgi_get_album_all_tracks/cgi_get_alltracks_editlist/cgi_get_artist_all_album/cgi_get_genre_all_tracks/cgi_get_tracks_list/cgi_set_airplay_content/cgi_write_playlist of the file /cgi-bin/myMusic.cgi. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced." }, { "lang": "de", "value": "Eine Schwachstelle wurde in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 bis 20240814 gefunden. Sie wurde als kritisch eingestuft. Betroffen davon ist die Funktion cgi_audio_search/cgi_create_playlist/cgi_get_album_all_tracks/cgi_get_alltracks_editlist/cgi_get_artist_all_album/cgi_get_genre_all_tracks/cgi_get_tracks_list/cgi_set_airplay_content/cgi_write_playlist der Datei /cgi-bin/myMusic.cgi. Durch das Beeinflussen mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Command Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-19T15:00:06.847Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-275108 | D-Link DNS-1550-04 myMusic.cgi cgi_write_playlist command injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.275108" }, { "name": "VDB-275108 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.275108" }, { "name": "Submit #391669 | D-Link DNS 320/320L/321/323/325/327L Command Injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.391669" }, { "tags": [ "exploit" ], "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_create_playlist.md" }, { "tags": [ "related" ], "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383" }, { "tags": [ "related" ], "url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_get_tracks_list.md" } ], "tags": [ "unsupported-when-assigned" ], "timeline": [ { "lang": "en", "time": "2024-08-19T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2024-08-19T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2024-08-19T11:49:33.000Z", "value": "VulDB entry last update" } ], "title": "D-Link DNS-1550-04 myMusic.cgi cgi_write_playlist command injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2024-7922", "datePublished": "2024-08-19T15:00:06.847Z", "dateReserved": "2024-08-19T09:43:35.228Z", "dateUpdated": "2024-08-19T18:23:40.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }