漏洞标题
D-Link DNS-320L/DNS-325/DNS-327L/DNS-340L HTTP GET Request nas_sharing.cgi 命令注入
漏洞描述信息
**分配时不受支持** 在D-Link DNS-320L、DNS-325、DNS-327L和DNS-340L的版本20240403中发现了一个被分类为关键的漏洞。受影响的是组件HTTP GET请求处理器中文件/cgi-bin/nas_sharing.cgi的未知功能。操纵参数system会导致命令注入。攻击可以远程进行。该漏洞的利用方法已经被公开,可能会被利用。此漏洞的标识符为VDB-259284。注意:此漏洞仅影响维护者不再支持的产品。注意:供应商已提前联系并立即确认该产品已到生命周期结束。应退役并替换该产品。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
在命令中使用的特殊元素转义处理不恰当(命令注入)
漏洞标题
D-Link DNS-320L/DNS-325/DNS-327L/DNS-340L HTTP GET Request nas_sharing.cgi command injection
漏洞描述信息
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
漏洞类别
在命令中使用的特殊元素转义处理不恰当(命令注入)
漏洞标题
D-Link DNS-320 命令注入漏洞
漏洞描述信息
D-Link DNS-320是中国友讯(D-Link)公司的一款NAS(网络附属存储)设备。 D-Link DNS-320L存在命令注入漏洞,该漏洞源于文件/cgi-bin/nas_sharing.cgi存在命令注入漏洞。受影响的产品和版本:D-Link DNS-320L,DNS-325,DNS-327,DNS-340L,D-Link NAS Storage。
CVSS信息
N/A
漏洞类别
命令注入