Vulnerability Description
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. This vulnerability affects the function cgi_set_cover of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument album_name leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dns-120 Firmware | - |
| Dlink | Dns-120 | - |
| Dlink | Dnr-202L Firmware | - |
| Dlink | Dnr-202L | - |
| Dlink | Dns-315L Firmware | - |
| Dlink | Dns-315L | - |
| Dlink | Dns-320 Firmware | - |
| Dlink | Dns-320 | - |
| Dlink | Dns-320L Firmware | - |
| Dlink | Dns-320L | - |
| Dlink | Dns-320Lw Firmware | - |
| Dlink | Dns-320Lw | - |
| Dlink | Dns-321 Firmware | - |
| Dlink | Dns-321 | - |
| Dlink | Dnr-322L Firmware | - |
| Dlink | Dnr-322L | - |
| Dlink | Dns-323 Firmware | - |
| Dlink | Dns-323 | - |
| Dlink | Dns-325 Firmware | - |
| Dlink | Dns-325 | - |
Related Weaknesses (CWE)
References
- https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_set_cover.mdExploit
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383Vendor Advisory
- https://vuldb.com/?ctiid.274726Permissions RequiredVDB Entry
- https://vuldb.com/?id.274726Permissions RequiredThird Party AdvisoryVDB Entry
- https://vuldb.com/?submit.390114Third Party AdvisoryVDB Entry
FAQ
What is CVE-2024-7828?
CVE-2024-7828 is a vulnerability with a CVSS score of 8.8 (HIGH). ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-...
How severe is CVE-2024-7828?
CVE-2024-7828 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-7828?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dns-120 Firmware, Dlink Dns-120, Dlink Dnr-202L Firmware, Dlink Dnr-202L, Dlink Dns-315L Firmware.