// For flags

CVE-2024-7715

D-Link DNS-1550-04 photocenter_mgr.cgi sprintf command injection

Severity Score

5.3
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240812. It has been classified as critical. This affects the function sprintf of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument filter leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.

Es wurde eine Schwachstelle in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 bis 20240812 ausgemacht. Sie wurde als kritisch eingestuft. Hiervon betroffen ist die Funktion sprintf der Datei /cgi-bin/photocenter_mgr.cgi. Durch das Manipulieren des Arguments filter mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240812. It has been classified as critical. This affects the function sprintf of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument filter leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.

*Credits: BuaaIoTTeam
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
Low
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
Low
None
Integrity
Low
None
Availability
Low
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
Poc
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-08-12 CVE Reserved
  • 2024-08-13 CVE Published
  • 2024-08-13 EPSS Updated
  • 2024-08-15 CVE Updated
  • 2024-08-15 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Dlink
Search vendor "Dlink"
Dnr-202l Firmware
Search vendor "Dlink" for product "Dnr-202l Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dnr-322l Firmware
Search vendor "Dlink" for product "Dnr-322l Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dnr-326 Firmware
Search vendor "Dlink" for product "Dnr-326 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-1100-4 Firmware
Search vendor "Dlink" for product "Dns-1100-4 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-1200-05 Firmware
Search vendor "Dlink" for product "Dns-1200-05 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-120 Firmware
Search vendor "Dlink" for product "Dns-120 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-1550-04 Firmware
Search vendor "Dlink" for product "Dns-1550-04 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-315l Firmware
Search vendor "Dlink" for product "Dns-315l Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-320 Firmware
Search vendor "Dlink" for product "Dns-320 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-320l Firmware
Search vendor "Dlink" for product "Dns-320l Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-320lw Firmware
Search vendor "Dlink" for product "Dns-320lw Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-321 Firmware
Search vendor "Dlink" for product "Dns-321 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-323 Firmware
Search vendor "Dlink" for product "Dns-323 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-325 Firmware
Search vendor "Dlink" for product "Dns-325 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-326 Firmware
Search vendor "Dlink" for product "Dns-326 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-327l Firmware
Search vendor "Dlink" for product "Dns-327l Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-340l Firmware
Search vendor "Dlink" for product "Dns-340l Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-343 Firmware
Search vendor "Dlink" for product "Dns-343 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-345 Firmware
Search vendor "Dlink" for product "Dns-345 Firmware"
*-
Affected
Dlink
Search vendor "Dlink"
Dns-726-4 Firmware
Search vendor "Dlink" for product "Dns-726-4 Firmware"
*-
Affected
* End Of Life in some or all products. Do not expect updates.