A very critical vulnerability found in D-Link products up to 20240403 allows remote initiation of an attack to obtain hard-coded credentials by manipulating user input in nas_sharing.cg
Reporter | Title | Published | Views | Family All 12 |
---|---|---|---|---|
![]() | CVE-2024-3272 D-Link DNS-320L/DNS-325/DNS-327L/DNS-340L HTTP GET Request nas_sharing.cgi hard-coded credentials | 4 Apr 202401:00 | – | vulnrichment |
![]() | CVE-2024-3272 | 4 Apr 202401:15 | – | cve |
![]() | D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability | 11 Apr 202400:00 | – | cisa_kev |
![]() | D-Link Multiple NAS Devices Command Injection Vulnerability | 11 Apr 202400:00 | – | cisa_kev |
![]() | CVE-2024-3272 | 4 Apr 202401:15 | – | nvd |
![]() | CVE-2024-3272 D-Link DNS-320L/DNS-325/DNS-327L/DNS-340L HTTP GET Request nas_sharing.cgi hard-coded credentials | 4 Apr 202401:00 | – | cvelist |
![]() | CVE-2024-3272 | 5 Feb 202510:02 | – | redhatcve |
![]() | Exploit for Use of Hard-coded Credentials in Dlink Dns-320L Firmware | 21 May 202408:40 | – | githubexploit |
![]() | Exploit for Use of Hard-coded Credentials in Dlink Dns-320L Firmware | 8 Apr 202413:54 | – | githubexploit |
![]() | Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks | 9 Apr 202405:46 | – | thn |
Source | Link |
---|---|
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
vuldb | www.vuldb.com/ |
vuldb | www.vuldb.com/ |
github | www.github.com/netsecfish/dlink |
supportannouncement | www.supportannouncement.us.dlink.com/security/publication.aspx |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo