Severity
High
Analysis Summary
CVE-2024-7849 CVSS:8.8
D-Link devices are vulnerable to a buffer overflow, caused by improper bounds checking by function cgi_create_album in photocenter_mgr.cgi. By sending a specially crafted string to the argument current_path, a remote authenticated attacker could overflow a buffer and cause the system to crash.
CVE-2024-41616 CVSS:9.8
D-Link DIR-300 REVA FIRMWARE v1.06B05_WW contains hardcoded credentials in the Telnet service.
CVE-2024-7828 CVSS:8.8
D-Link devices are vulnerable to a buffer overflow, caused by improper bounds checking by cgi_set_cover . By sending a specially crafted string to photocenter_mgr.cgi , a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. This vulnerability affects the function cgi_set_cover of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument album_name leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
Impact
- Buffer Overflow
Indicators of Compromise
CVE
- CVE-2024-7849
- CVE-2024-41616
- CVE-2024-7828
Affected Vendors
Affected Products
- D-Link DNS-320L
- D-Link DNR-202L - 20240814
- D-Link DNS-120 - 20240814
- D-Link DNS-315L - 20240814
- D-Link DNS-320 - 20240814
- D-Link DNS-120
- D-Link DNR-202L
- D-Link DNS-315L
- D-Link DIR-300 REVA FIRMWARE v1.06B05_WW
Remediation
Refer to D-Link Website for patch, upgrade, or suggested workaround information.