CVE-2024-3273

7.3 HIGH CISA KEV - Actively Exploited
Published: April 04, 2024 Modified: October 30, 2025

Description

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/netsecfish/dlink
Source: cna@vuldb.com
Exploit Third Party Advisory
https://vuldb.com/?ctiid.259284
Source: cna@vuldb.com
Permissions Required VDB Entry
https://vuldb.com/?id.259284
Source: cna@vuldb.com
Third Party Advisory VDB Entry
https://vuldb.com/?submit.304661
Source: cna@vuldb.com
Third Party Advisory VDB Entry
https://github.com/netsecfish/dlink
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://vuldb.com/?ctiid.259284
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required VDB Entry
https://vuldb.com/?id.259284
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://vuldb.com/?submit.304661
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-3273
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource
https://www.greynoise.io/blog/cve-2024-3273-d-link-nas-rce-exploited-in-the-wild
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Third Party Advisory

12 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.3 / 10.0
EPSS (Exploit Probability)
94.4%
100th percentile
Exploitation Status
Actively Exploited
Remediation due: 2024-05-02

Weaknesses (CWE)

Affected Vendors

dlink