{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-10916","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-11-06T07:07:58.999Z","datePublished":"2024-11-06T15:00:08.202Z","dateUpdated":"2024-11-06T16:15:00.331Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-11-06T15:54:07.409Z"},"title":"D-Link DNS-320/DNS-320LW/DNS-325/DNS-340L HTTP GET Request info.xml information disclosure","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-200","lang":"en","description":"Information Disclosure"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]}],"affected":[{"vendor":"D-Link","product":"DNS-320","versions":[{"version":"20241028","status":"affected"}],"modules":["HTTP GET Request Handler"]},{"vendor":"D-Link","product":"DNS-320LW","versions":[{"version":"20241028","status":"affected"}],"modules":["HTTP GET Request Handler"]},{"vendor":"D-Link","product":"DNS-325","versions":[{"version":"20241028","status":"affected"}],"modules":["HTTP GET Request Handler"]},{"vendor":"D-Link","product":"DNS-340L","versions":[{"version":"20241028","status":"affected"}],"modules":["HTTP GET Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. This affects an unknown part of the file /xml/info.xml of the component HTTP GET Request Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"Es wurde eine Schwachstelle in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L bis 20241028 entdeckt. Sie wurde als problematisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei /xml/info.xml der Komponente HTTP GET Request Handler. Mittels Manipulieren mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}}],"timeline":[{"time":"2024-11-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-11-06T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-11-06T08:13:07.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"netsecfish (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.283311","name":"VDB-283311 | D-Link DNS-320/DNS-320LW/DNS-325/DNS-340L HTTP GET Request info.xml information disclosure","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.283311","name":"VDB-283311 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.432849","name":"Submit #432849 | D-Link DNS-320, DNS-320LW, DNS-325, DNS-340L Version 1.00, Version 1.01.0914.2012, Version 1.01,  Version 1.02, Version 1.08 Information Disclosure","tags":["third-party-advisory"]},{"url":"https://netsecfish.notion.site/Information-Disclosure-Vulnerability-Report-in-xml-info-xml-for-D-Link-NAS-12d6b683e67c8019a311e699582f51b6?pvs=4","tags":["exploit"]},{"url":"https://www.dlink.com/","tags":["product"]}]},"adp":[{"affected":[{"vendor":"dlink","product":"dns-320_firmware","cpes":["cpe:2.3:o:dlink:dns-320_firmware:20241028:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"20241028","status":"affected"}]},{"vendor":"dlink","product":"dns-320lw_firmware","cpes":["cpe:2.3:o:dlink:dns-320lw_firmware:20241028:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"20241028","status":"affected"}]},{"vendor":"dlink","product":"dns-325_firmware","cpes":["cpe:2.3:o:dlink:dns-325_firmware:20241028:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"20241028","status":"affected"}]},{"vendor":"dlink","product":"dns-340l_firmware","cpes":["cpe:2.3:o:dlink:dns-340l_firmware:20241028:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"20241028","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-06T16:12:52.250923Z","id":"CVE-2024-10916","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-06T16:15:00.331Z"}}]}}