POC详情: b1b5a95194081785d07afd1fe7eb076bd54d21f8

来源
关联漏洞
标题: D-Link多款产品 安全漏洞 (CVE-2024-10914)
描述:D-Link DNS-320等都是中国友讯(D-Link)公司的一款NAS(网络附属存储)设备。 D-Link多款产品存在安全漏洞,该漏洞源于对参数name的错误操作会导致操作系统命令注入。以下产品及版本受到影响:D-Link DNS-320、DNS-320LW、DNS-325和DNS-340L 20241028版本及之前版本。
描述
CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.
介绍
# CVE-2024-10914: Critical Command Injection Vulnerability in D-Link NAS Devices

## Description
CVE-2024-10914 is a critical command injection vulnerability affecting legacy D-Link Network Attached Storage (NAS) devices. This flaw, with a **CVSS score of 9.2**, allows unauthenticated attackers to execute arbitrary shell commands by exploiting improper input validation in the `cgi_user_add` command. 

The vulnerability can be triggered remotely using a specially crafted HTTP GET request, making it highly exploitable.

## Affected Devices
This vulnerability impacts the following D-Link NAS models:
- **DNS-320**: Firmware version 1.00
- **DNS-320LW**: Version 1.01.0914.2012
- **DNS-325**: Versions 1.01 and 1.02
- **DNS-340L**: Version 1.08

文件快照

[4.0K] /data/pocs/b1b5a95194081785d07afd1fe7eb076bd54d21f8 ├── [5.2K] exploit.cpp ├── [1.0K] LICENSE └── [ 749] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。