Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

D-Link DNS-320 Remote Command Injection Vulnerability

Information

Severity

Severity

Critical

Family

Family

Web application abuses

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

4 years ago

Modified

Modified

4 years ago

Summary

The D-Link DNS-320 NAS-device is prone to a remote command injection vulnerability.

Insight

Insight

The flaw exists in the login module of the device when using a hidden feature called SSL Login, for which its required parameter, port, can be poisoned.

Affected Software

Affected Software

D-Link DNS-320 versions through 2.05.B10.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Update to version 2.06B01 or later.

Common Vulnerabilities and Exposures (CVE)