{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-3272","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-04-03T18:21:29.925Z","datePublished":"2024-04-04T01:00:05.740Z","dateUpdated":"2025-10-21T23:05:22.378Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-04-11T09:44:24.119Z"},"title":"D-Link DNS-320L/DNS-325/DNS-327L/DNS-340L HTTP GET Request nas_sharing.cgi hard-coded credentials","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-798","lang":"en","description":"CWE-798 Hard-coded Credentials"}]}],"affected":[{"vendor":"D-Link","product":"DNS-320L","versions":[{"version":"20240403","status":"affected"}],"modules":["HTTP GET Request Handler"]},{"vendor":"D-Link","product":"DNS-325","versions":[{"version":"20240403","status":"affected"}],"modules":["HTTP GET Request Handler"]},{"vendor":"D-Link","product":"DNS-327L","versions":[{"version":"20240403","status":"affected"}],"modules":["HTTP GET Request Handler"]},{"vendor":"D-Link","product":"DNS-340L","versions":[{"version":"20240403","status":"affected"}],"modules":["HTTP GET Request Handler"]}],"descriptions":[{"lang":"en","value":"** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259283. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced."},{"lang":"de","value":"Eine Schwachstelle wurde in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L bis 20240403 entdeckt. Sie wurde als sehr kritisch eingestuft. Betroffen davon ist ein unbekannter Prozess der Datei /cgi-bin/nas_sharing.cgi der Komponente HTTP GET Request Handler. Mit der Manipulation des Arguments user mit der Eingabe messagebus mit unbekannten Daten kann eine hard-coded credentials-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":9.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"CRITICAL"}},{"cvssV3_0":{"version":"3.0","baseScore":9.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"CRITICAL"}},{"cvssV2_0":{"version":"2.0","baseScore":10,"vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}}],"timeline":[{"time":"2024-04-03T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-04-03T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-04-11T11:49:12.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"netsecfish","type":"finder"}],"references":[{"url":"https://vuldb.com/?id.259283","name":"VDB-259283 | D-Link DNS-320L/DNS-325/DNS-327L/DNS-340L HTTP GET Request nas_sharing.cgi hard-coded credentials","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.259283","name":"VDB-259283 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://github.com/netsecfish/dlink","tags":["exploit"]},{"url":"https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383","tags":["related"]}],"tags":["unsupported-when-assigned"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-3272","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-04-12T04:00:39.050176Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2024-04-11","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-3272"}}}],"affected":[{"cpes":["cpe:2.3:o:dlink:dns-320l_firmware:-:*:*:*:*:*:*:*"],"vendor":"dlink","product":"dns-320l_firmware","versions":[{"status":"affected","version":"20240403"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:o:dlink:dns-325_firmware:-:*:*:*:*:*:*:*"],"vendor":"dlink","product":"dns-325_firmware","versions":[{"status":"affected","version":"20240403"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:o:dlink:dns-327l_firmware:-:*:*:*:*:*:*:*"],"vendor":"dlink","product":"dns-327l_firmware","versions":[{"status":"affected","version":"20240403"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:o:dlink:dns-340l_firmware:-:*:*:*:*:*:*:*"],"vendor":"dlink","product":"dns-340l_firmware","versions":[{"status":"affected","version":"20240403"}],"defaultStatus":"unknown"}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-3272","tags":["government-resource"]}],"timeline":[{"time":"2024-04-11T00:00:00.000Z","lang":"en","value":"CVE-2024-3272 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:05:22.378Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T20:05:08.352Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.259283","name":"VDB-259283 | D-Link DNS-320L/DNS-325/DNS-327L/DNS-340L HTTP GET Request nas_sharing.cgi hard-coded credentials","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.259283","name":"VDB-259283 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/netsecfish/dlink","tags":["exploit","x_transferred"]},{"url":"https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383","tags":["related","x_transferred"]}]}]}}