** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. This affects the function cgi_create_album of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument current_path leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
History

Fri, 16 Aug 2024 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dnr-202l Firmware
Dlink dnr-322l Firmware
Dlink dnr-326 Firmware
Dlink dns-1100-4 Firmware
Dlink dns-1200-05 Firmware
Dlink dns-120 Firmware
Dlink dns-1550-04 Firmware
Dlink dns-315l Firmware
Dlink dns-320 Firmware
Dlink dns-320l Firmware
Dlink dns-320lw Firmware
Dlink dns-321 Firmware
Dlink dns-323 Firmware
Dlink dns-325 Firmware
Dlink dns-326 Firmware
Dlink dns-327l Firmware
Dlink dns-340l Firmware
Dlink dns-343 Firmware
Dlink dns-345 Firmware
Dlink dns-726-4 Firmware
CPEs cpe:2.3:o:dlink:dnr-202l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dnr-322l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dnr-326_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-1100-4_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-1200-05_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-120_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-1550-04_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-315l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-320_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-320l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-320lw_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-321_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-323_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-325_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-326_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-327l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-340l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-343_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-345_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dns-726-4_firmware:*:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dnr-202l Firmware
Dlink dnr-322l Firmware
Dlink dnr-326 Firmware
Dlink dns-1100-4 Firmware
Dlink dns-1200-05 Firmware
Dlink dns-120 Firmware
Dlink dns-1550-04 Firmware
Dlink dns-315l Firmware
Dlink dns-320 Firmware
Dlink dns-320l Firmware
Dlink dns-320lw Firmware
Dlink dns-321 Firmware
Dlink dns-323 Firmware
Dlink dns-325 Firmware
Dlink dns-326 Firmware
Dlink dns-327l Firmware
Dlink dns-340l Firmware
Dlink dns-343 Firmware
Dlink dns-345 Firmware
Dlink dns-726-4 Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 15 Aug 2024 23:45:00 +0000

Type Values Removed Values Added
Description ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. This affects the function cgi_create_album of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument current_path leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
Title D-Link DNS-1550-04 photocenter_mgr.cgi cgi_create_album buffer overflow
Weaknesses CWE-120
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-08-15T23:31:06.300Z

Updated: 2024-08-16T17:21:43.257Z

Reserved: 2024-08-15T16:01:33.030Z

Link: CVE-2024-7849

cve-icon Vulnrichment

Updated: 2024-08-16T16:16:44.330Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-16T02:15:18.420

Modified: 2024-08-19T13:00:23.117

Link: CVE-2024-7849

cve-icon Redhat

No data.