Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3273: CWE-77 Command Injection in D-Link DNS-320L

0
High
VulnerabilityCVE-2024-3273cvecve-2024-3273cwe-77
Published: Thu Apr 04 2024 (04/04/2024, 01:00:06 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DNS-320L

Description

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:41:52 UTC

Technical Analysis

CVE-2024-3273 is a command injection vulnerability identified in multiple D-Link NAS devices, specifically DNS-320L, DNS-325, DNS-327L, and DNS-340L, up to firmware version 20240403. The vulnerability resides in an unspecified function within the /cgi-bin/nas_sharing.cgi script, part of the HTTP GET request handler. By manipulating the 'system' argument in the HTTP request, an attacker can inject arbitrary OS commands, which the device executes with the privileges of the web server process. This flaw allows remote, unauthenticated attackers to execute arbitrary commands on the affected device, potentially leading to full system compromise. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating improper sanitization of input leading to command injection. The vendor has confirmed these products are end-of-life and no patches will be provided. The CVSS v3.1 base score is 7.3, reflecting network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability. Although no active exploitation has been reported, the public disclosure and availability of exploit details increase the risk of attacks targeting these devices. Given the nature of NAS devices as data storage and sharing points, successful exploitation could lead to data theft, device takeover, or use as a pivot point within internal networks.

Potential Impact

The impact of CVE-2024-3273 is significant for organizations still operating affected D-Link NAS devices. Successful exploitation allows remote attackers to execute arbitrary commands without authentication, potentially leading to full device compromise. This can result in unauthorized access to sensitive stored data, disruption of file sharing services, and the device being used as a foothold for lateral movement within corporate networks. The compromise of NAS devices can also lead to data exfiltration, ransomware deployment, or destruction of data, impacting confidentiality, integrity, and availability. Since these devices are often connected to internal networks and may store backups or critical files, the risk extends beyond the device itself to the broader organizational infrastructure. The lack of vendor support and patches exacerbates the risk, as vulnerabilities remain unmitigated. Organizations relying on these devices face increased exposure to targeted attacks, especially in sectors where data availability and confidentiality are critical, such as healthcare, education, and small to medium enterprises.

Mitigation Recommendations

Given the end-of-life status of the affected D-Link NAS devices and absence of patches, the primary mitigation is to retire and replace these devices with supported models that receive security updates. Until replacement is feasible, organizations should isolate these NAS devices from untrusted networks by placing them behind strict firewalls or within segmented VLANs to limit exposure. Disable any unnecessary network services and restrict access to the management interface to trusted IP addresses only. Employ network intrusion detection/prevention systems (IDS/IPS) to monitor for suspicious HTTP requests targeting /cgi-bin/nas_sharing.cgi or unusual command execution patterns. Regularly audit network traffic and device logs for signs of exploitation attempts. If possible, disable the vulnerable CGI functionality or restrict its usage. Implement compensating controls such as strong network segmentation, multi-factor authentication on adjacent systems, and regular backups stored offline to mitigate potential data loss. Finally, educate IT staff about the risks of using unsupported hardware and the importance of timely device lifecycle management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-04-03T18:21:32.401Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b3247d717aace26a6a

Added to database: 10/21/2025, 7:06:27 PM

Last enriched: 2/28/2026, 4:41:52 AM

Last updated: 3/22/2026, 2:23:50 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses