Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3272: CWE-798 Hard-coded Credentials in D-Link DNS-320L

0
Critical
VulnerabilityCVE-2024-3272cvecve-2024-3272cwe-798
Published: Thu Apr 04 2024 (04/04/2024, 01:00:05 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DNS-320L

Description

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as very critical, has been found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. This issue affects some unknown processing of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument user with the input messagebus leads to hard-coded credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259283. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:40:22 UTC

Technical Analysis

CVE-2024-3272 is a critical security vulnerability identified in multiple D-Link NAS devices (DNS-320L, DNS-325, DNS-327L, DNS-340L) up to firmware version 20240403. The vulnerability stems from hard-coded credentials embedded within the HTTP GET request handler component, specifically in the processing of the /cgi-bin/nas_sharing.cgi endpoint. By manipulating the 'user' parameter with the value 'messagebus', an attacker can bypass authentication mechanisms and gain unauthorized access. This flaw is remotely exploitable without requiring any privileges or user interaction, making it highly dangerous. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), which is a well-known security weakness that allows attackers to bypass authentication controls. The CVSS v3.1 base score is 9.8, reflecting the ease of exploitation and the severe impact on confidentiality, integrity, and availability. The vendor has confirmed that these products are end-of-life and no patches will be provided, emphasizing the need for device retirement. The exploit details have been publicly disclosed, increasing the likelihood of active exploitation attempts. The lack of vendor support and patch availability means that affected organizations must rely on compensating controls or device replacement to mitigate risk.

Potential Impact

For European organizations, the impact of CVE-2024-3272 is substantial. These NAS devices often store critical business data, backups, or shared files, and unauthorized access could lead to data theft, data manipulation, or complete service disruption. The vulnerability allows remote attackers to fully compromise the device, potentially using it as a foothold for lateral movement within corporate networks. This could result in exposure of sensitive personal data protected under GDPR, leading to regulatory penalties and reputational damage. Additionally, compromised NAS devices could be leveraged in ransomware attacks or as part of botnets. The fact that these devices are end-of-life means no security updates will be forthcoming, increasing the risk over time. Organizations relying on these devices for storage or file sharing must consider the risk of data breaches and operational downtime. The impact is especially critical for sectors with high data sensitivity such as finance, healthcare, and government institutions within Europe.

Mitigation Recommendations

Given the absence of patches, the primary mitigation is to immediately retire and replace all affected D-Link NAS devices with supported and secure alternatives. Until replacement, organizations should isolate these devices on segmented network zones with strict access controls to limit exposure. Disable any unnecessary services and restrict access to the management interfaces to trusted IP addresses only. Employ network monitoring to detect unusual access patterns or exploitation attempts targeting the /cgi-bin/nas_sharing.cgi endpoint. Implement strong perimeter defenses such as firewalls and intrusion detection/prevention systems configured to block or alert on suspicious HTTP GET requests. Regularly audit network devices to identify any legacy or unsupported hardware. Backup critical data stored on these devices to secure, isolated locations to prevent data loss. Educate IT staff about the risks of using end-of-life hardware and enforce asset lifecycle management policies to avoid similar risks in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-04-03T18:21:29.925Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b3247d717aace26a63

Added to database: 10/21/2025, 7:06:27 PM

Last enriched: 10/21/2025, 7:40:22 PM

Last updated: 10/30/2025, 1:49:48 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats