Логотип exploitDog
bind:CVE-2024-10915
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-10915

Количество 3

Количество 3

nvd логотип

CVE-2024-10915

больше 1 года назад

A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been rated as critical. Affected by this issue is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument group leads to os command injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.

CVSS3: 8.1
EPSS: Критический
github логотип

GHSA-6cgw-73x3-c2h9

больше 1 года назад

A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been rated as critical. Affected by this issue is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument group leads to os command injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.

CVSS3: 8.1
EPSS: Критический
fstec логотип

BDU:2024-09495

больше 1 года назад

Уязвимость функции cgi_user_add файла /cgi-bin/account_mgr.cgi?cmd=cgi_user_add микропрограммного обеспечения маршрутизаторов D-Link DNS-320, DNS-320LW, DNS-325 и DNS-340L, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-10915

A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been rated as critical. Affected by this issue is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument group leads to os command injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.

CVSS3: 8.1
94%
Критический
больше 1 года назад
github логотип
GHSA-6cgw-73x3-c2h9

A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been rated as critical. Affected by this issue is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument group leads to os command injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.

CVSS3: 8.1
94%
Критический
больше 1 года назад
fstec логотип
BDU:2024-09495

Уязвимость функции cgi_user_add файла /cgi-bin/account_mgr.cgi?cmd=cgi_user_add микропрограммного обеспечения маршрутизаторов D-Link DNS-320, DNS-320LW, DNS-325 и DNS-340L, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
94%
Критический
больше 1 года назад

Уязвимостей на страницу