Critical Flaw Exposes 92,000 D-Link NAS Devices: Arbitrary Command Injection and Backdoor Revealed

by | Apr 8, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A recent disclosure by threat researcher ‘Netsecfish’ has unveiled severe vulnerabilities affecting multiple end-of-life D-Link Network Attached Storage (NAS) device models. The flaws, identified as CVE-2024-3273, involve an arbitrary command injection and a hardcoded backdoor within the ‘/cgi-bin/nas_sharing.cgi’ script’s HTTP GET Request Handler component.

The vulnerability stems from two critical issues:

  1. Hardcoded Backdoor: The presence of a hardcoded account (‘messagebus’ with an empty password) facilitates unauthorized access.
  2. Arbitrary Command Injection: A flaw in the “system” parameter allows attackers to execute arbitrary commands remotely by injecting base64-encoded commands via HTTP GET requests.

When exploited together, these vulnerabilities enable threat actors to gain unauthorized access to sensitive information, manipulate system configurations, or induce denial of service conditions.

Example of the malicious requestExample of the malicious request (Netsecfish|GitHub)

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Impacted D-Link NAS device models include:

  • DNS-320L (Versions 1.11, 1.03.0904.2013, 1.01.0702.2013)
  • DNS-325 (Version 1.01)
  • DNS-327L (Versions 1.09, 1.00.0409.2013)
  • DNS-340L (Version 1.08)

According to Netsecfish’s network scans, over 92,000 vulnerable D-Link NAS devices are exposed online, making them susceptible to exploitation through these critical flaws.

Internet scan resultsInternet scan results (Netsecfish|GitHub)

No patches available

No patches are available for these end-of-life devices, as confirmed by D-Link, as they have reached the end of service life and are no longer supported. D-Link advises users to retire these devices and replace them with supported alternatives that receive regular firmware updates.




To mitigate risks associated with using outdated hardware, D-Link has issued a security bulletin urging immediate retirement or replacement of vulnerable devices. Users adamant about continuing to use legacy NAS devices are encouraged to navigate D-Link’s dedicated support page for archived security and firmware updates. However, it’s essential to note that these updates will not address newly discovered vulnerabilities like CVE-2024-3273.

Additionally, D-Link emphasizes the importance of never exposing NAS devices to the internet, as they are frequently targeted by threat actors seeking to steal data or deploy ransomware attacks. Ensuring network security by retiring or replacing vulnerable devices is paramount to safeguarding against potential exploits and data breaches.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This