Skip to content

A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)

Notifications You must be signed in to change notification settings

K3ysTr0K3R/CVE-2024-10914-EXPLOIT

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2024-10914 - D-Link Remote Code Execution (RCE)

This repo contains a proof-of-concept (PoC) exploit for a critical vulnerability affecting D-Link NAS devices. The bug, tracked as CVE-2024-10914, impacts the following models:

  • D-Link DNS-320
  • D-Link DNS-320LW
  • D-Link DNS-325
  • D-Link DNS-340L

The vulnerability is in a function called cgi_user_add, which is part of the /cgi-bin/account_mgr.cgi script.
The bug happens because the name parameter isn't properly checked before it’s used in system commands.
This lets an attacker send malicious input (OS commands) in the name field to execute anything they want on the device. For example an attacker can send/execute an id command through the path of the name field /cgi-bin/account_mgr.cgi?cmd=cgi_user_add&name=%27;id;%27

Disclaimer

This PoC is only for testing and learning purposes. I’m not responsible for any illegal or harmful use of this code. Always act responsibly when researching or testing vulnerabilities.

About

A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages