// For flags

CVE-2024-10916

D-Link DNS-320/DNS-320LW/DNS-325/DNS-340L HTTP GET Request info.xml information disclosure

Severity Score

6.9
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A vulnerability classified as problematic has been found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. This affects an unknown part of the file /xml/info.xml of the component HTTP GET Request Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Es wurde eine Schwachstelle in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L bis 20241028 entdeckt. Sie wurde als problematisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei /xml/info.xml der Komponente HTTP GET Request Handler. Mittels Manipulieren mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.

*Credits: netsecfish
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
Low
None
Integrity
None
None
Availability
None
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-11-06 CVE Reserved
  • 2024-11-06 CVE Published
  • 2024-11-06 CVE Updated
  • 2024-11-06 First Exploit
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • CWE-266: Incorrect Privilege Assignment
  • CWE-284: Improper Access Control
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Dlink
Search vendor "Dlink"
Dns-320 Firmware
Search vendor "Dlink" for product "Dns-320 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-320lw Firmware
Search vendor "Dlink" for product "Dns-320lw Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-325 Firmware
Search vendor "Dlink" for product "Dns-325 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-340l Firmware
Search vendor "Dlink" for product "Dns-340l Firmware"
*-
Affected
D-link
Search vendor "D-link"
Dns-320
Search vendor "D-link" for product "Dns-320"
*-
Affected
D-link
Search vendor "D-link"
Dns-320lw
Search vendor "D-link" for product "Dns-320lw"
*-
Affected
D-link
Search vendor "D-link"
Dns-325
Search vendor "D-link" for product "Dns-325"
*-
Affected
D-link
Search vendor "D-link"
Dns-340l
Search vendor "D-link" for product "Dns-340l"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-320 Firmware
Search vendor "Dlink" for product "Dns-320 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-320lw Firmware
Search vendor "Dlink" for product "Dns-320lw Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-325 Firmware
Search vendor "Dlink" for product "Dns-325 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-340l Firmware
Search vendor "Dlink" for product "Dns-340l Firmware"
*-
Affected