CVE-2024-10914: Critical Flaw in D-Link NAS Devices Actively Exploited, No Patch!

CVE-2024-10914 exploit
Image: The Shadowserver Foundation

A critical command injection vulnerability (CVE-2024-10914) impacting numerous end-of-life D-Link network-attached storage (NAS) devices is currently under active exploitation. This vulnerability, assigned a CVSSv3 score of 9.2, poses a significant threat to organizations and individuals utilizing these devices, as successful exploitation can lead to complete system compromise.

Vulnerability Analysis

CVE-2024-10914 resides within the cgi_user_add command due to insufficient sanitization of the “name” parameter. This allows unauthenticated attackers to inject arbitrary shell commands via specifically crafted HTTP GET requests. Security researcher Netsecfish has published a detailed technical analysis of the vulnerability, including proof-of-concept exploit code utilizing the following command structure:

curl "http://[Target-IP]/cgi-bin/account_mgr.cgi cmd=cgi_user_add&name=%27;<INJECTED_SHELL_COMMAND>;%27"

This exploit leverages the vulnerable parameter to inject and execute malicious commands within the targeted NAS device.

Scope of Impact

The vulnerability affects the following D-Link NAS models:

  • DNS-320 Version 1.00
  • DNS-320LW Version 1.01.0914.2012
  • DNS-325 Version 1.01, Version 1.02
  • DNS-340L Version 1.08

Netsecfish’s research identified over 60,000 potentially vulnerable devices exposed on the internet. Furthermore, the Shadowserver Foundation has reported observing active exploitation attempts targeting these devices since November 12th, with nearly 1,100 devices confirmed as exposed.

Mitigation Strategies

D-Link has officially confirmed that no patch will be released for CVE-2024-10914 due to the end-of-life status of the affected devices. In light of this, immediate mitigation is crucial. D-Link strongly recommends retiring vulnerable devices. If immediate retirement is not feasible, the following measures are critical:

  • Network Isolation: Isolate the affected devices from the public internet to prevent external access.
  • Access Control: Implement strict access control measures, limiting device access to authorized personnel only.

Related Posts: