Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
D-Link DNS-320 Remote Command Injection Vulnerability
Information
Severity
Severity
Critical
Family
Family
Web application abuses
CVSSv2 Base
CVSSv2 Base
10.0
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
4 years ago
Modified
Modified
4 years ago
Summary
The D-Link DNS-320 NAS-device is prone to a remote command injection vulnerability.
Insight
Insight
The flaw exists in the login module of the device when using a hidden feature called SSL Login, for which its required parameter, port, can be poisoned.
Affected Software
Affected Software
D-Link DNS-320 versions through 2.05.B10.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Update to version 2.06B01 or later.