CVE-2024-3273: CWE-77 Command Injection in D-Link DNS-320L
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
AI Analysis
Technical Summary
CVE-2024-3273 is a command injection vulnerability identified in multiple D-Link NAS devices, specifically DNS-320L, DNS-325, DNS-327L, and DNS-340L, up to firmware version 20240403. The vulnerability resides in an unspecified function within the /cgi-bin/nas_sharing.cgi script, part of the HTTP GET request handler. By manipulating the 'system' argument in the HTTP request, an attacker can inject arbitrary OS commands, which the device executes with the privileges of the web server process. This flaw allows remote, unauthenticated attackers to execute arbitrary commands on the affected device, potentially leading to full system compromise. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating improper sanitization of input leading to command injection. The vendor has confirmed these products are end-of-life and no patches will be provided. The CVSS v3.1 base score is 7.3, reflecting network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability. Although no active exploitation has been reported, the public disclosure and availability of exploit details increase the risk of attacks targeting these devices. Given the nature of NAS devices as data storage and sharing points, successful exploitation could lead to data theft, device takeover, or use as a pivot point within internal networks.
Potential Impact
The impact of CVE-2024-3273 is significant for organizations still operating affected D-Link NAS devices. Successful exploitation allows remote attackers to execute arbitrary commands without authentication, potentially leading to full device compromise. This can result in unauthorized access to sensitive stored data, disruption of file sharing services, and the device being used as a foothold for lateral movement within corporate networks. The compromise of NAS devices can also lead to data exfiltration, ransomware deployment, or destruction of data, impacting confidentiality, integrity, and availability. Since these devices are often connected to internal networks and may store backups or critical files, the risk extends beyond the device itself to the broader organizational infrastructure. The lack of vendor support and patches exacerbates the risk, as vulnerabilities remain unmitigated. Organizations relying on these devices face increased exposure to targeted attacks, especially in sectors where data availability and confidentiality are critical, such as healthcare, education, and small to medium enterprises.
Mitigation Recommendations
Given the end-of-life status of the affected D-Link NAS devices and absence of patches, the primary mitigation is to retire and replace these devices with supported models that receive security updates. Until replacement is feasible, organizations should isolate these NAS devices from untrusted networks by placing them behind strict firewalls or within segmented VLANs to limit exposure. Disable any unnecessary network services and restrict access to the management interface to trusted IP addresses only. Employ network intrusion detection/prevention systems (IDS/IPS) to monitor for suspicious HTTP requests targeting /cgi-bin/nas_sharing.cgi or unusual command execution patterns. Regularly audit network traffic and device logs for signs of exploitation attempts. If possible, disable the vulnerable CGI functionality or restrict its usage. Implement compensating controls such as strong network segmentation, multi-factor authentication on adjacent systems, and regular backups stored offline to mitigate potential data loss. Finally, educate IT staff about the risks of using unsupported hardware and the importance of timely device lifecycle management.
Affected Countries
United States, Germany, Japan, United Kingdom, France, Australia, Canada, South Korea, Netherlands, Italy
CVE-2024-3273: CWE-77 Command Injection in D-Link DNS-320L
Description
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-3273 is a command injection vulnerability identified in multiple D-Link NAS devices, specifically DNS-320L, DNS-325, DNS-327L, and DNS-340L, up to firmware version 20240403. The vulnerability resides in an unspecified function within the /cgi-bin/nas_sharing.cgi script, part of the HTTP GET request handler. By manipulating the 'system' argument in the HTTP request, an attacker can inject arbitrary OS commands, which the device executes with the privileges of the web server process. This flaw allows remote, unauthenticated attackers to execute arbitrary commands on the affected device, potentially leading to full system compromise. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating improper sanitization of input leading to command injection. The vendor has confirmed these products are end-of-life and no patches will be provided. The CVSS v3.1 base score is 7.3, reflecting network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability. Although no active exploitation has been reported, the public disclosure and availability of exploit details increase the risk of attacks targeting these devices. Given the nature of NAS devices as data storage and sharing points, successful exploitation could lead to data theft, device takeover, or use as a pivot point within internal networks.
Potential Impact
The impact of CVE-2024-3273 is significant for organizations still operating affected D-Link NAS devices. Successful exploitation allows remote attackers to execute arbitrary commands without authentication, potentially leading to full device compromise. This can result in unauthorized access to sensitive stored data, disruption of file sharing services, and the device being used as a foothold for lateral movement within corporate networks. The compromise of NAS devices can also lead to data exfiltration, ransomware deployment, or destruction of data, impacting confidentiality, integrity, and availability. Since these devices are often connected to internal networks and may store backups or critical files, the risk extends beyond the device itself to the broader organizational infrastructure. The lack of vendor support and patches exacerbates the risk, as vulnerabilities remain unmitigated. Organizations relying on these devices face increased exposure to targeted attacks, especially in sectors where data availability and confidentiality are critical, such as healthcare, education, and small to medium enterprises.
Mitigation Recommendations
Given the end-of-life status of the affected D-Link NAS devices and absence of patches, the primary mitigation is to retire and replace these devices with supported models that receive security updates. Until replacement is feasible, organizations should isolate these NAS devices from untrusted networks by placing them behind strict firewalls or within segmented VLANs to limit exposure. Disable any unnecessary network services and restrict access to the management interface to trusted IP addresses only. Employ network intrusion detection/prevention systems (IDS/IPS) to monitor for suspicious HTTP requests targeting /cgi-bin/nas_sharing.cgi or unusual command execution patterns. Regularly audit network traffic and device logs for signs of exploitation attempts. If possible, disable the vulnerable CGI functionality or restrict its usage. Implement compensating controls such as strong network segmentation, multi-factor authentication on adjacent systems, and regular backups stored offline to mitigate potential data loss. Finally, educate IT staff about the risks of using unsupported hardware and the importance of timely device lifecycle management.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-04-03T18:21:32.401Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7d9b3247d717aace26a6a
Added to database: 10/21/2025, 7:06:27 PM
Last enriched: 2/28/2026, 4:41:52 AM
Last updated: 3/22/2026, 2:23:50 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.