NVD Vulnerability Detail
Search Exploit, PoC
CVE-2024-7832
Summary

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814 and classified as critical. Affected by this issue is the function cgi_get_fullscreen_photos of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument user leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.

Publication Date Aug. 15, 2024, 11:15 p.m.
Registration Date Aug. 26, 2024, 5:03 p.m.
Last Update Aug. 20, 2024, 1:02 a.m.
CVSS3.1 : HIGH
スコア 8.8
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR)
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:dlink:dns-120_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-120:-:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:o:dlink:dnr-202l_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dnr-202l:-:*:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:o:dlink:dns-315l_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-315l:-:*:*:*:*:*:*:*
Configuration4 or higher or less more than less than
cpe:2.3:o:dlink:dns-320_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:*
Configuration5 or higher or less more than less than
cpe:2.3:o:dlink:dns-320l_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-320l:-:*:*:*:*:*:*:*
Configuration6 or higher or less more than less than
cpe:2.3:o:dlink:dns-320lw_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-320lw:-:*:*:*:*:*:*:*
Configuration7 or higher or less more than less than
cpe:2.3:o:dlink:dns-321_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-321:-:*:*:*:*:*:*:*
Configuration8 or higher or less more than less than
cpe:2.3:o:dlink:dnr-322l_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dnr-322l:-:*:*:*:*:*:*:*
Configuration9 or higher or less more than less than
cpe:2.3:o:dlink:dns-323_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-323:-:*:*:*:*:*:*:*
Configuration10 or higher or less more than less than
cpe:2.3:o:dlink:dns-325_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-325:-:*:*:*:*:*:*:*
Configuration11 or higher or less more than less than
cpe:2.3:o:dlink:dns-326_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-326:-:*:*:*:*:*:*:*
Configuration12 or higher or less more than less than
cpe:2.3:o:dlink:dns-327l_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-327l:-:*:*:*:*:*:*:*
Configuration13 or higher or less more than less than
cpe:2.3:o:dlink:dnr-326_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dnr-326:-:*:*:*:*:*:*:*
Configuration14 or higher or less more than less than
cpe:2.3:o:dlink:dns-340l_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-340l:-:*:*:*:*:*:*:*
Configuration15 or higher or less more than less than
cpe:2.3:o:dlink:dns-343_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-343:-:*:*:*:*:*:*:*
Configuration16 or higher or less more than less than
cpe:2.3:o:dlink:dns-345_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-345:-:*:*:*:*:*:*:*
Configuration17 or higher or less more than less than
cpe:2.3:o:dlink:dns-726-4_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-726-4:-:*:*:*:*:*:*:*
Configuration18 or higher or less more than less than
cpe:2.3:o:dlink:dns-1100-4_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-1100-4:-:*:*:*:*:*:*:*
Configuration19 or higher or less more than less than
cpe:2.3:o:dlink:dns-1200-05_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-1200-05:-:*:*:*:*:*:*:*
Configuration20 or higher or less more than less than
cpe:2.3:o:dlink:dns-1550-04_firmware:-:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:dlink:dns-1550-04:-:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
複数の D-Link Systems, Inc. 製品における古典的バッファオーバーフローの脆弱性
Title 複数の D-Link Systems, Inc. 製品における古典的バッファオーバーフローの脆弱性
Summary

** サポート外 ** 本件は、サポートされていない製品における脆弱性です。 dns-120 ファームウェア、dnr-202l ファームウェア、dns-315l ファームウェア等複数の D-Link Systems, Inc. 製品には、古典的バッファオーバーフローの脆弱性が存在します。

Possible impacts 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダアドバイザリまたはパッチ情報が公開されています。参考情報を参照して適切な対策を実施してください。

Publication Date Aug. 15, 2024, midnight
Registration Date Aug. 21, 2024, 10:21 a.m.
Last Update Aug. 21, 2024, 10:21 a.m.
Affected System
D-Link Systems, Inc.
D-Link DNR-326 ファームウェア 
D-Link DNS-320 ファームウェア 
D-Link DNS-320L ファームウェア 
D-Link DNS-320LW ファームウェア 
D-Link DNS-325 ファームウェア 
D-Link DNS-327L ファームウェア 
D-Link DNS-345 ファームウェア 
dnr-202l ファームウェア 
dnr-322l ファームウェア 
dns-1100-4 ファームウェア 
dns-120 ファームウェア 
dns-1200-05 ファームウェア 
dns-1550-04 ファームウェア 
dns-315l ファームウェア 
dns-321 ファームウェア 
dns-323 ファームウェア 
dns-326 ファームウェア 
dns-340l ファームウェア 
dns-343 ファームウェア 
dns-726-4 ファームウェア 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
その他
Change Log
No Changed Details Date of change
1 [2024年08月21日]
  掲載
Aug. 21, 2024, 10:21 a.m.