CVE-2024-10914
HIGH EXPLOITED NUCLEIDlink Dns-320 Firmware - Command Injection
Title source: ruleDescription
A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
Exploits (17)
nomisec
WORKING POC
47 stars
by verylazytech · remote
https://github.com/verylazytech/CVE-2024-10914
github
WRITEUP
7 stars
by cybersecplayground · poc
https://github.com/cybersecplayground/PoC-and-CVE-Reports/tree/main/2024/CVE-2024-10914.md
nomisec
WORKING POC
4 stars
by K3ysTr0K3R · remote
https://github.com/K3ysTr0K3R/CVE-2024-10914-EXPLOIT
nomisec
WORKING POC
1 stars
by Bu0uCat · remote
https://github.com/Bu0uCat/D-Link-NAS-CVE-2024-10914-
Nuclei Templates (1)
D-Link NAS - Command Injection via Name Parameter
CRITICALby s4e-io
Shodan:
http.html:"sharecenter"
FOFA:
body="sharecenter"
References (6)
Scores
CVSS v3
8.1
EPSS
0.9393
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-11-13
CWE
CWE-78
CWE-74
CWE-707
Status
published
Products (4)
dlink/dns-320_firmware
dlink/dns-320lw_firmware
dlink/dns-325_firmware
dlink/dns-340l_firmware
Published
Nov 06, 2024
Tracked Since
Feb 18, 2026