CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/SC:N/VI:L/SI:N/VA:L/SA:N
AI Score
Confidence
Low
SSVC
Exploitation
poc
Automatable
no
Technical Impact
partial
UNSUPPORTED WHEN ASSIGNED A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240812. It has been classified as critical. This affects the function sprintf of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument filter leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
[
{
"vendor": "D-Link",
"product": "DNS-120",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNR-202L",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-315L",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-320",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-320L",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-320LW",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-321",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNR-322L",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-323",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-325",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-326",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-327L",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNR-326",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-340L",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-343",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-345",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-726-4",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-1100-4",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-1200-05",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
},
{
"vendor": "D-Link",
"product": "DNS-1550-04",
"versions": [
{
"status": "affected",
"version": "20240812"
}
]
}
]
[
{
"cpes": [
"cpe:2.3:o:dlink:dns-120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dnr-202l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-315l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-320l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-320lw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-321_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dnr-322l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-323_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-325_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-326_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-327l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dnr-326_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-340l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-343_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-345_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-726-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-1100-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-1200-05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-1550-04_firmware:*:*:*:*:*:*:*:*"
],
"vendor": "dlink",
"product": "dns-120_firmware",
"versions": [
{
"status": "affected",
"version": "0",
"versionType": "custom",
"lessThanOrEqual": "20240812"
}
],
"defaultStatus": "unknown"
}
]
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/SC:N/VI:L/SI:N/VA:L/SA:N
AI Score
Confidence
Low
SSVC
Exploitation
poc
Automatable
no
Technical Impact
partial