

STRRAT Malware – Active IOCs
April 16, 2024
Chinese iOS Spyware ‘LightSpy’ Targeting iPhone Users in South Asia – Active IOCs
April 16, 2024
STRRAT Malware – Active IOCs
April 16, 2024
Chinese iOS Spyware ‘LightSpy’ Targeting iPhone Users in South Asia – Active IOCs
April 16, 2024Severity
High
Analysis Summary
CVE-2024-3272
D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L could allow a remote attacker to gain elevated privileges on the system, caused by the use of hard-coded credentials of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. An attacker could exploit this vulnerability to gain elevated privileges and execute arbitrary code on the system.
CVE-2024-3273
D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L could allow a remote attacker to execute arbitrary commands on the system, caused by a command injection of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. An attacker could exploit this vulnerability to execute arbitrary commands on the system.
Impact
- Gain Access
- Privilege Escalation
Indicators of Compromise
CVE
- CVE-2024-3272
- CVE-2024-3273
Affected Vendors
Affected Products
- D-Link DNS-320L
- D-Link DNS-325
- D-Link DNS-327L
- D-Link DNS-340L 20240403
Remediation
Refer D-Link Website for patch, upgrade, or suggested workaround information.