cve/2024/CVE-2024-8461.md
2025-09-29 21:09:30 +02:00

21 lines
1.6 KiB
Markdown

### [CVE-2024-8461](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8461)
![](https://img.shields.io/static/v1?label=Product&message=DNS-320&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.02b01%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Information%20Disclosure&color=brightgreen)
### Description
A vulnerability, which was classified as problematic, was found in D-Link DNS-320 2.02b01. This affects an unknown part of the file /cgi-bin/discovery.cgi of the component Web Management Interface. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
Es wurde eine problematische Schwachstelle in D-Link DNS-320 2.02b01 gefunden. Es geht dabei um eine nicht klar definierte Funktion der Datei /cgi-bin/discovery.cgi der Komponente Web Management Interface. Durch Beeinflussen mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
### POC
#### Reference
- https://github.com/leetsun/IoT-Vuls/tree/main/Dlink-dns320/4
#### Github
- https://github.com/20142995/nuclei-templates
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/fkie-cad/nvd-json-data-feeds