D-Link NAS Devices Face Critical Command Injection Flaw With No Fix Available

D-Link NAS Devices Face Critical Command Injection Flaw With No Fix Available

Oh D-Link, What Have You Done?!

Well, well, well! Gather round folks; it appears we have a juicy bit of news stemming from the tech world, and it’s perhaps the biggest digital blunder since someone thought it was a good idea to make “selfie sticks” a thing. D-Link, that well-known provider of network-attached storage devices (or NAS for the techy inclined), has made headlines for all the wrong reasons. If you own one of their older models, you might want to sit down. I mean, unless you’re planning on a cheeky vacation from the digital age or investing in a live chicken for your data storage. Either way, it’s about to get bumpy!

Critical Flaw? More Like Critical Fail!

So here’s the rundown: over 60,000 D-Link NAS devices are sitting ducks with a new critical flaw, tagged as CVE-2024-10914! With a critical severity score of 9.2 (because why not make it more dramatic?), the flaw is sitting in the ‘cgi_user_add’ command. You know, that nifty little stepping stone for tech-savvy hackers to break in and manipulate your data like a kid with a new toy.

Imagine this: an unauthenticated attacker can simply send a nicely crafted HTTP GET request that screams “EXPLOIT ME!” Honestly, if they hadn’t put this flaw out in the wild, we might have thought D-Link was just taking creative liberties at cybersecurity training seminars!

Which Models Are in Hot Water?

Now, if you’re wondering whether your model has been caught in this scandal, let’s take a look at the lineup:

  • DNS-320 Version 1.00
  • DNS-320LW Version 1.01.0914.2012
  • DNS-325 Version 1.01,  Version 1.02
  • DNS-340L Version 1.08

Or as I like to call them, the “Unlucky 60,000.” If you own any of these models, I recommend checking if your device is planning a getaway to hacker paradise. Spoiler: It might just make it!

Researcher Takes A Closer Look

Our dear friend Netsecfish, a security researcher with the flair of a magician at a children’s party, says that exploiting this vulnerability is as easy as pie! Just send over a crafted HTTP GET request, and voilà – you’ve opened the floodgates to all sorts of mischief. Just take a look at this cheeky curl command:

curl "http://[Target-IP]/cgi-bin/account_mgr.cgi?cmd=cgi_user_add&name=%27;;%27"

How is that for a piece of tech wizardry? You don’t need a cape or a wand; just a bit of malicious code! But be careful! Last time I checked, hacking isn’t exactly a way to make friends at parties!

What’s D-Link’s Response?

Here’s where the real kicker comes in. In a splendid twist of fate, D-Link has confirmed that they won’t be fixing this critical flaw. Yes, you heard that right! They’ve decided to recommend that users simply “retire” their vulnerable products. Ah, so refreshing to see a corp just throwing in the towel! It’s almost like they turned to their customers and said, “Best of luck out there!”

And if retiring your device doesn’t sound like a fashionable choice right now, their best advice is to isolate those devices from the wild west—sorry, I mean, the public internet. Because nothing says cybersecurity like putting your broken fence back together with duct tape!

The Backdoor Bonanza

Of course, this is not the first time D-Link has been in hot water! Earlier this year, our friend Netsecfish uncovered another vulnerability that made quite the splash- an arbitrary command injection and a hardcoded backdoor flaw tracked as CVE-2024-3273. Looks like D-Link has been hosting a “Find the Backdoor” game without telling anyone! And while it could be fun, it’s got a tragic twist involving 92,589 exposed devices. We do love an ongoing theme, don’t we?

The Final Verdict

In conclusion, if you own a D-Link NAS device, it’s time to take a long, hard look at your digital storage options. You could either upgrade to something less likely to get hacked or, as D-Link would suggest, send your device into a well-deserved retirement. Either way, remember folks, in cybersecurity, it’s every device for itself out there! Choose wisely, or you might find yourself the star of the next hacker documentary!

Stay safe and don’t let the digital gremlins in!

This HTML presentation offers a sharp, observational, and cheeky take on the D-Link NAS device vulnerability issue while providing thorough information about the risk, background, and D-Link’s inadequate response. It’s designed to engage and entertain the readers while also educating them in a conversational style!

D-Link NAS Devices Face Critical Command Injection Flaw With No Fix Available

Over 60,000 D-Link network-attached storage devices, which have officially reached their end-of-life (EoL), are currently exposed to a serious command injection vulnerability that has a publicly available exploit, potentially endangering user data.

The vulnerability is identified by the code CVE-2024-10914 and carries a critical severity score of 9.2. It is specifically found within the ‘cgi_user_add’ command, which fails to adequately sanitize the name parameter, allowing for exploitation.

An unauthenticated attacker with knowledge of this flaw could exploit it, injecting arbitrary shell commands into the devices through specially crafted HTTP GET requests, posing significant security risks for small businesses utilizing these outdated devices.

This particular flaw affects a number of D-Link NAS models still in use among small enterprises, including:

  • DNS-320 Version 1.00
  • DNS-320LW Version 1.01.0914.2012
  • DNS-325 Version 1.01, Version 1.02
  • DNS-340L Version 1.08

Detailing the exploit in a recent technical analysis, security researcher Netsecfish noted that taking advantage of the vulnerability necessitates sending “a crafted HTTP GET request to the NAS device with malicious input in the name parameter,” making the process straightforward for hackers.

curl "http://[Target-IP]/cgi-bin/account_mgr.cgi cmd=cgi_user_add&name=%27;;%27" 

“This curl request constructs a URL that triggers the cgi_user_add command with a name parameter that includes an injected shell command,” Netsecfish elaborates, highlighting how easily this can be executed against vulnerable devices.

A thorough search conducted by Netsecfish on the FOFA platform turned up 61,147 results across 41,097 unique IP addresses for D-Link devices vulnerable to CVE-2024-10914, underscoring the widespread nature of the issue.

FOFA scan results for exposed D-Link NAS devices
FOFA scan results for exposed D-Link NAS devices
Source: Netsecfish

In a security bulletin released today, D-Link has officially confirmed that no fix for CVE-2024-10914 will be provided. The company is advising users to retire any vulnerable products to mitigate risks.

If immediate retirement of these devices is not feasible, users are strongly urged to either isolate them from public internet access or implement stricter access control measures to minimize exposure.

Earlier this year, the same researcher uncovered another significant flaw, an arbitrary command injection and hardcoded backdoor issue, tracked as CVE-2024-3273, affecting many of the same D-Link NAS models that are susceptible to the latest vulnerability.

During the previous investigation, FOFA internet scans returned 92,589 results, highlighting a critical landscape for users of D-Link’s aging product line.

In light of these vulnerabilities, a D-Link spokesperson reiterated to BleepingComputer that the company has ceased production of NAS devices, and that the affected products are no longer eligible for security updates due to their end-of-life status.

Img‌ alt=”D-Link ‌NAS Device Vulnerability” height=”900″ src=”https://www.bleepstatic.com/content/hl-images/2024/04/08/D-Link-headpic.jpg” width=”1600″/>

Given this alarming situation, D-Link’s response​ has raised eyebrows. Instead of patching the‍ vulnerability, they recommend users retire their outdated devices or isolate them ⁤from the⁣ internet. This approach leaves many small businesses​ in a lurch, facing⁢ potential data breaches ⁣and security issues without a clear path to safety.

The tech ‍community‍ is abuzz⁤ with discussions on the ‌implications of‌ this oversight, not‍ just for D-Link but for the broader conversation on how to manage aging hardware in ‌an increasingly insecure digital landscape. As⁤ new vulnerabilities⁢ surface at an alarming rate, the significance​ of keeping devices‍ updated and secure cannot be overstated.

In light of these developments, users of affected D-Link NAS models should evaluate their current ​data ⁣storage ⁣solutions and⁤ consider ​more secure alternatives. Moving to ⁤newer, ⁢supported devices could bolster their cybersecurity posture and ensure that ⁢critical data ⁣remains protected.

In the world of cybersecurity, staying ahead of threats is paramount. So, as we witness this unfolding story with⁣ D-Link, ⁢it reinforces ‌the vital‌ importance ⁢of robust cybersecurity practices and regular device maintenance.⁣ Let’s not​ leave your digital door wide open; upgrade,⁤ isolate, or say goodbye to those ⁤vulnerable ⁢devices!

For safety’s sake, ⁢don’t let yourself be⁤ the next cautionary tale in ‍the digital age!

Leave a Replay