** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240812. It has been classified as critical. This affects the function sprintf of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument filter leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
History

Thu, 15 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:dlink:dnr-202l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dnr-322l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dnr-326_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-1100-4_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-1200-05_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-120_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-1550-04_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-315l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-320_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-320l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-320lw_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-321_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-323_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-325_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-326_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-327l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-340l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-343_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-345_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-726-4_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dnr-202l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dnr-322l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dnr-326_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-1100-4_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-1200-05_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-120_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-1550-04_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-315l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-320_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-320l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-320lw_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-321_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-323_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-325_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-326_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-327l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-340l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-343_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-345_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-726-4_firmware:*:*:*:*:*:*:*:*

Wed, 14 Aug 2024 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dnr-202l Firmware
Dlink dnr-322l Firmware
Dlink dnr-326 Firmware
Dlink dns-1100-4 Firmware
Dlink dns-1200-05 Firmware
Dlink dns-120 Firmware
Dlink dns-1550-04 Firmware
Dlink dns-315l Firmware
Dlink dns-320 Firmware
Dlink dns-320l Firmware
Dlink dns-320lw Firmware
Dlink dns-321 Firmware
Dlink dns-323 Firmware
Dlink dns-325 Firmware
Dlink dns-326 Firmware
Dlink dns-327l Firmware
Dlink dns-340l Firmware
Dlink dns-343 Firmware
Dlink dns-345 Firmware
Dlink dns-726-4 Firmware
CPEs cpe:2.3:a:dlink:dnr-202l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dnr-322l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dnr-326_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-1100-4_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-1200-05_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-120_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-1550-04_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-315l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-320_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-320l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-320lw_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-321_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-323_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-325_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-326_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-327l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-340l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-343_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-345_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dns-726-4_firmware:*:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dnr-202l Firmware
Dlink dnr-322l Firmware
Dlink dnr-326 Firmware
Dlink dns-1100-4 Firmware
Dlink dns-1200-05 Firmware
Dlink dns-120 Firmware
Dlink dns-1550-04 Firmware
Dlink dns-315l Firmware
Dlink dns-320 Firmware
Dlink dns-320l Firmware
Dlink dns-320lw Firmware
Dlink dns-321 Firmware
Dlink dns-323 Firmware
Dlink dns-325 Firmware
Dlink dns-326 Firmware
Dlink dns-327l Firmware
Dlink dns-340l Firmware
Dlink dns-343 Firmware
Dlink dns-345 Firmware
Dlink dns-726-4 Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Aug 2024 06:45:00 +0000

Type Values Removed Values Added
Description ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240812. It has been classified as critical. This affects the function sprintf of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument filter leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
Title D-Link DNS-1550-04 photocenter_mgr.cgi sprintf command injection
Weaknesses CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-08-13T06:31:04.655Z

Updated: 2024-08-15T14:28:38.576Z

Reserved: 2024-08-12T18:44:27.907Z

Link: CVE-2024-7715

cve-icon Vulnrichment

Updated: 2024-08-13T15:20:03.485Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-13T07:15:13.677

Modified: 2024-08-15T15:15:22.690

Link: CVE-2024-7715

cve-icon Redhat

No data.