D-LINK DNS-320L,DNS-320LW and DNS-327L - Information Disclosure
ID: CVE-2024-3274
Severity: medium
Author: DhiyaneshDk
Tags: cve,cve2024,dlink,exposure
Description
Section titled “Description”A vulnerability has been found in D-Link DNS-320L, DNS-320LW and DNS-327L up to 20240403 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/info.cgi of the component HTTP GET Request Handler.
YAML Source
Section titled “YAML Source”id: CVE-2024-3274
info: name: D-LINK DNS-320L,DNS-320LW and DNS-327L - Information Disclosure author: DhiyaneshDk severity: medium description: | A vulnerability has been found in D-Link DNS-320L, DNS-320LW and DNS-327L up to 20240403 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/info.cgi of the component HTTP GET Request Handler. reference: - https://github.com/netsecfish/info_cgi - https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383 - https://nvd.nist.gov/vuln/detail/CVE-2024-3274 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2024-3274 cwe-id: CWE-200 epss-score: 0.00045 epss-percentile: 0.15047 cpe: cpe:2.3:h:dlink:dns-320l:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 fofa-query: body="Text:In order to access the ShareCenter" product: dns-320l vendor: dlink tags: cve,cve2024,dlink,exposure
http: - raw: - | GET /cgi-bin/info.cgi HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'contains_all(body, "Model=", "Build=", "Macaddr=")' - 'status_code == 200' condition: and# digest: 4a0a00473045022100edfe9565550437da69d4c2135f8ab822e69a2ca6fa804a52003f3d3bace90cf8022011cc0c35ffebd23ea6dc1a301812279a95d59cb7c92e1cb80aa834d51d571f15:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-3274.yaml"