CVE-2024-3273

Published Apr 4, 2024

Last updated 6 months ago

Overview

Description
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
Source
cna@vuldb.com
NVD status
Analyzed
CNA Tags
unsupported-when-assigned
Products
dns-320l_firmware, dns-120_firmware, dnr-202l_firmware, dns-315l_firmware, dns-320_firmware, dns-320lw_firmware, dns-321_firmware, dnr-322l_firmware, dns-323_firmware, dns-325_firmware, dns-326_firmware, dns-327l_firmware, dnr-326_firmware, dns-340l_firmware, dns-343_firmware, dns-345_firmware, dns-726-4_firmware, dns-1100-4_firmware, dns-1200-05_firmware, dns-1550-04_firmware

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

CVSS 2.0

Type
Secondary
Base score
7.5
Impact score
6.4
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:P/I:P/A:P

Known exploits

Data from CISA

Vulnerability name
D-Link Multiple NAS Devices Command Injection Vulnerability
Exploit added on
Apr 11, 2024
Exploit action due
May 2, 2024
Required action
This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.

Weaknesses

cna@vuldb.com
CWE-77

Social media

Hype score
Not currently trending
  1. Cytellite recent detection targeting CVE-2024-3273 — UAB Host Baltic Visit -- https://t.co/ALOc8RnNEg #Loginsoft #Cytellite #Cybersecurity #CVE20243273 #LOVI #ThreatIntelligence #Infosecurity #AI https://t.co/Wanlx2EeGq

    @Loginsoft_Intel

    19 Feb 2026

    55 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. 🔴 hono/jsx, Cross-Site Scripting, #CVE-2024-3273 (Critical) https://t.co/XT5j7iw9Eq

    @dailycve

    28 Jan 2026

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. 92,000 D-Link NAS Devices actively exploiting .No patches available for the vulnerabilities CVE-2024-3272 and CVE-2024-3273. These vulnerabilities are actively exploited by attackers to take remote control of D-Link network-attached storage (NAS) devices. https://t.co/z6gbofc

    @peggynicky2013

    8 Jan 2026

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. 92,000 D-Link NAS Devices actively exploiting .No patches available for the vulnerabilities CVE-2024-3272 and CVE-2024-3273. These vulnerabilities are actively exploited by attackers to take remote control of D-Link network-attached storage (NAS) devices. https://t.co/CQjmMPE

    @luisunlocks

    1 Dec 2025

    53 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 漏洞:CVE-2024-3273 D-Link 网络存储 (NAS)是中国友讯(D-link)公司的一款统一服务路由器。 D-Link NAS nas_sharing.cgi接口存在命令执行漏洞,该漏洞存在于“/cgi-bin/nas_sharing.cgi”脚本中,影响其 HTTP GET 请求处理程序组件。

    @LaoShu_Yes

    26 Jul 2025

    1524 Impressions

    0 Retweets

    64 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. 🔴 D-Link NAS Devices Critical Vulnerability: #CVE-2024-3273 (Critical) - Critical https://t.co/YcShTjzBok

    @dailycve

    29 Nov 2024

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations