CVE-2024-3273 Scanner
CVE-2024-3273 scanner - Command Injection vulnerability in D-Link Network Attached Storage
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 second
Time Interval
4 week
Scan only one
Url
Toolbox
-
D-Link Network Attached Storage (NAS) devices are commonly used in homes and small businesses for data storage and sharing. These devices allow multiple users to access and share files over a network. NAS devices are favored for their ease of use, cost-effectiveness, and ability to provide centralized storage. They are used by individuals for personal backups and by small organizations to store critical business data. Due to their network connectivity, they are susceptible to various cyber threats if not properly secured.
The vulnerability identified in the D-Link NAS devices allows an attacker to perform command injection via the HTTP GET request handler. By manipulating a specific argument in the request, attackers can execute arbitrary commands on the device. This issue affects unsupported versions of the product, and the vendor has confirmed that these devices should be retired and replaced. Exploiting this vulnerability can lead to unauthorized access and control over the NAS device.
The vulnerable endpoint is /cgi-bin/nas_sharing.cgi
, and the issue arises from improper handling of the system
argument in an HTTP GET request. Attackers can inject commands by encoding them in base64 format and appending them to the URL. The NAS device fails to properly sanitize this input, allowing remote command execution. Successful exploitation returns a response indicating authentication success and command execution results. This flaw makes the device susceptible to remote attacks, potentially compromising stored data.
Exploiting this command injection vulnerability can have severe consequences, including unauthorized access to the NAS device and its data. Attackers can execute arbitrary commands, leading to data theft, corruption, or deletion. The vulnerability can also be used to establish persistent backdoors, allowing ongoing unauthorized access. Additionally, compromised devices can be leveraged to launch further attacks on the internal network or other connected systems.
By using the S4E platform, you can ensure your digital assets are secure from such critical vulnerabilities. Our comprehensive scanning tools detect and report vulnerabilities, helping you take proactive measures to protect your data. Join S4E today to benefit from our advanced threat detection and exposure management services, keeping your systems safe from cyber threats.
References:
- https://github.com/netsecfish/dlink
- https://www.bleepingcomputer.com/news/security/over-92-000-exposed-d-link-nas-devices-have-a-backdoor-account/#google_vignette
- https://news.ycombinator.com/item?id=39960107
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383
- https://vuldb.com/?ctiid.259284