CVE-2024-3272: CWE-798 Hard-coded Credentials in D-Link DNS-320L
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259283. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
AI Analysis
Technical Summary
CVE-2024-3272 is a severe security vulnerability classified under CWE-798 (Use of Hard-coded Credentials) affecting multiple D-Link NAS models: DNS-320L, DNS-325, DNS-327L, and DNS-340L, up to firmware version 20240403. The vulnerability resides in the HTTP GET request handler component, specifically in the processing of the /cgi-bin/nas_sharing.cgi endpoint. An attacker can manipulate the 'user' parameter by supplying the value 'messagebus', which triggers the use of hard-coded credentials embedded within the device's firmware. This flaw enables remote attackers to bypass authentication mechanisms entirely, gaining unauthorized administrative access to the device. The vulnerability is exploitable over the network without any privileges or user interaction, making it highly dangerous. The vendor has confirmed these products are end-of-life and no longer supported, meaning no official patches or firmware updates will be issued. Public disclosure of the exploit code has occurred, increasing the likelihood of active exploitation. The CVSS v3.1 score of 9.8 reflects the criticality, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This vulnerability poses a significant risk to data confidentiality and device availability, potentially allowing attackers to exfiltrate sensitive data, disrupt NAS operations, or use the device as a foothold for further network compromise.
Potential Impact
The impact of CVE-2024-3272 is severe for organizations still operating affected D-Link NAS devices. Exploitation allows remote attackers to gain full administrative control without authentication, leading to complete compromise of the device. This can result in unauthorized access to sensitive stored data, disruption or deletion of files, and potential use of the device as a pivot point for lateral movement within the network. Given the devices are often used for file sharing and backups, data confidentiality and integrity are at high risk. The availability of critical storage services may also be disrupted, impacting business continuity. Since these devices are end-of-life with no vendor support, organizations cannot rely on patches, increasing exposure duration. The public availability of exploit code raises the likelihood of opportunistic attacks, including ransomware or data theft campaigns targeting vulnerable NAS devices. Small and medium businesses or home offices that rely on these legacy devices are particularly vulnerable, potentially leading to significant operational and financial damage.
Mitigation Recommendations
The primary mitigation for CVE-2024-3272 is to immediately retire and replace all affected D-Link NAS devices with supported, updated models that do not contain this vulnerability. Since the vendor has confirmed end-of-life status and no patches will be released, patching is not an option. Organizations should perform a thorough inventory to identify any impacted devices and remove them from production environments. If immediate replacement is not feasible, affected devices should be isolated from untrusted networks, especially the internet, by placing them behind strict firewalls or network segmentation controls. Disable any unnecessary services and restrict access to the NAS management interfaces to trusted internal networks only. Monitoring network traffic for suspicious activity targeting /cgi-bin/nas_sharing.cgi or unusual authentication attempts can help detect exploitation attempts. Additionally, organizations should implement compensating controls such as strong network access controls, VPNs for remote access, and regular backups stored offline to mitigate data loss. Finally, educating users about the risks of legacy unsupported devices and enforcing hardware lifecycle policies will prevent similar exposures in the future.
Affected Countries
United States, Germany, United Kingdom, Australia, Canada, France, Netherlands, Japan, South Korea, Brazil, India
CVE-2024-3272: CWE-798 Hard-coded Credentials in D-Link DNS-320L
Description
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259283. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-3272 is a severe security vulnerability classified under CWE-798 (Use of Hard-coded Credentials) affecting multiple D-Link NAS models: DNS-320L, DNS-325, DNS-327L, and DNS-340L, up to firmware version 20240403. The vulnerability resides in the HTTP GET request handler component, specifically in the processing of the /cgi-bin/nas_sharing.cgi endpoint. An attacker can manipulate the 'user' parameter by supplying the value 'messagebus', which triggers the use of hard-coded credentials embedded within the device's firmware. This flaw enables remote attackers to bypass authentication mechanisms entirely, gaining unauthorized administrative access to the device. The vulnerability is exploitable over the network without any privileges or user interaction, making it highly dangerous. The vendor has confirmed these products are end-of-life and no longer supported, meaning no official patches or firmware updates will be issued. Public disclosure of the exploit code has occurred, increasing the likelihood of active exploitation. The CVSS v3.1 score of 9.8 reflects the criticality, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This vulnerability poses a significant risk to data confidentiality and device availability, potentially allowing attackers to exfiltrate sensitive data, disrupt NAS operations, or use the device as a foothold for further network compromise.
Potential Impact
The impact of CVE-2024-3272 is severe for organizations still operating affected D-Link NAS devices. Exploitation allows remote attackers to gain full administrative control without authentication, leading to complete compromise of the device. This can result in unauthorized access to sensitive stored data, disruption or deletion of files, and potential use of the device as a pivot point for lateral movement within the network. Given the devices are often used for file sharing and backups, data confidentiality and integrity are at high risk. The availability of critical storage services may also be disrupted, impacting business continuity. Since these devices are end-of-life with no vendor support, organizations cannot rely on patches, increasing exposure duration. The public availability of exploit code raises the likelihood of opportunistic attacks, including ransomware or data theft campaigns targeting vulnerable NAS devices. Small and medium businesses or home offices that rely on these legacy devices are particularly vulnerable, potentially leading to significant operational and financial damage.
Mitigation Recommendations
The primary mitigation for CVE-2024-3272 is to immediately retire and replace all affected D-Link NAS devices with supported, updated models that do not contain this vulnerability. Since the vendor has confirmed end-of-life status and no patches will be released, patching is not an option. Organizations should perform a thorough inventory to identify any impacted devices and remove them from production environments. If immediate replacement is not feasible, affected devices should be isolated from untrusted networks, especially the internet, by placing them behind strict firewalls or network segmentation controls. Disable any unnecessary services and restrict access to the NAS management interfaces to trusted internal networks only. Monitoring network traffic for suspicious activity targeting /cgi-bin/nas_sharing.cgi or unusual authentication attempts can help detect exploitation attempts. Additionally, organizations should implement compensating controls such as strong network access controls, VPNs for remote access, and regular backups stored offline to mitigate data loss. Finally, educating users about the risks of legacy unsupported devices and enforcing hardware lifecycle policies will prevent similar exposures in the future.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-04-03T18:21:29.925Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7d9b3247d717aace26a63
Added to database: 10/21/2025, 7:06:27 PM
Last enriched: 2/28/2026, 4:41:30 AM
Last updated: 3/26/2026, 2:15:57 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.