CVE-2024-10914
Dlink
CVE-2024-10914 is a critical vulnerability affecting D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L devices, leading to potential OS command injection. This vulnerability, found in the cgi_user_add function, allows remote attackers to execute arbitrary commands by manipulating the 'name' argument. With a SOCRadar Vulnerability Risk Score (SVRS) of 94, indicating immediate action is needed, this flaw poses a significant risk. Publicly available exploits increase the likelihood of attacks. Successful exploitation could lead to complete system compromise and data breach. The high SVRS underscores the urgency for patching this command injection flaw. This vulnerability is significant because it affects popular D-Link devices and could be exploited to cause widespread harm.
Description
CVE-2024-10914 affects D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L devices up to firmware version 20241028. This critical vulnerability exists in the cgi_user_add
function within the /cgi-bin/account_mgr.cgi?cmd=cgi_user_add
file, allowing attackers to manipulate the name
argument, leading to OS command injection. This vulnerability can be exploited remotely and has been publicly disclosed, meaning it's actively exploited by hackers. With a SVRS score of 84, this vulnerability is considered critical, requiring immediate action.
Key Insights
- Remote Exploitation: This vulnerability can be exploited remotely, meaning attackers can compromise devices without requiring physical access. This poses a significant risk, as attackers can target devices from anywhere in the world.
- OS Command Injection: The vulnerability allows attackers to execute arbitrary commands on the affected device. This gives them complete control over the device and its operating system, allowing them to install malware, steal data, or take other malicious actions.
- Publicly Disclosed Exploit: Exploits for this vulnerability have been published, making it easier for attackers to exploit it. This significantly increases the risk of successful attacks.
- Active Exploitation in the Wild: The vulnerability is actively being exploited by hackers, indicating a high level of threat. This means devices are already being compromised, highlighting the urgency of addressing this issue.
Mitigation Strategies
- Update Firmware: Immediately update affected D-Link DNS devices to the latest firmware version. This will patch the vulnerability and prevent attackers from exploiting it.
- Network Segmentation: Implement network segmentation to isolate vulnerable devices from critical network resources. This helps contain the damage if a device is compromised, preventing attackers from spreading to other parts of the network.
- Intrusion Detection/Prevention Systems (IDS/IPS): Deploy IDS/IPS solutions to detect and prevent attacks targeting this vulnerability. These solutions can monitor network traffic for suspicious activity and block attacks before they succeed.
- Regular Vulnerability Scanning: Regularly scan the network for vulnerabilities, including this CVE, to identify and address vulnerabilities before they can be exploited.
Additional Information
If you have any further questions about this specific vulnerability, you can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.