Do you have a D-Link NAS? You can be vulnerable and be attacked…

The discovery of vulnerabilities in digital products is something that happens quite frequently. As a rule, companies rush to release the necessary corrections for reasons of security, but also of public image. Even though there are more than 60,000 vulnerable NAS, D-Link will not release a fix for the flaw found in its equipment.

Taking into account the information available in the NIST vulnerability database, we can easily see that this flaw in D-Link products is something serious. Searching for CVE-2024-10914, It is described that this is a vulnerability that affects several D-Link models:

  • DNS-320 Version 1.00
  • DNS-320LW Version 1.01.0914.2012
  • DNS-325 Version 1.01, Version 1.02
  • DNS-340L Version 1.08

Do you have a D-Link NAS? See if you are vulnerable

These equipment are typically used in SMEs. The severity level of the vulnerability is 9.2being classified as criticismaccording to CVSS 4.0:

Do you have a D-Link NAS? See if you are vulnerable

How dangerous is the D-Link vulnerability CVE-2024-10914?

As mentioned, equipment that has this vulnerability is susceptible to attacks via http. The problem lies in the function cgi_user_add, more specifically in /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. Manipulating the name argument allows commands to be sent to the equipment, allowing the attacker, for example, to add users and then have full control of the equipment.

curl "http://(Target-IP)/cgi-bin/account_mgr.cgi cmd=cgi_user_add&name=%27;;%27"

A search on the FOFA platform returned 61147 results, 41097 of which are unique IPs of vulnerable D-Link devices with the CVE-2024-10914 vulnerability.

D-Link confirmed here which will not launch any type of update, recommending replacing them with newer devices.

Source: pplware.sapo.pt