Decoding D-Link NAS Vulnerabilities: Risks And Mitigation

A user named "" disclosed these and it targets the nas_sharing.cgi CGI script.

by Ashish Khaitan April 12, 2024 in Firewall Daily, Vulnerabilities Reading Time: 3 mins read 0

592 SHARES 3.3k VIEWS Share on LinkedInShare on Twitter

An active exploitation of critical vulnerabilities in (NAS) devices has raised concerns for D-Link users exposing 92,000 devices. Identified as and , these were reported on GitHub on March 26, 2024, and later confirmed by D-Link on April 4, 2024.

A user named “netsecfish” disclosed these D-Link vulnerabilities and it targets the nas_sharing.cgi CGI script, posing severe risks to affected devices. CVE-2024-3272 exposes hard-coded credentials, while CVE-2024-3273 enables remote attackers to execute arbitrary commands via command injection. 

This combination allows unauthorized access, data breaches, system configuration alterations, and potential denial-of-service attacks.

Decoding the D-Link NAS Vulnerabilities and Its Impact

Cyble Global Sensor Intelligence (CGSI) has detected ongoing exploitation attempts of these vulnerabilities since April 9, indicating the weaponization of publicly available exploits by threat actors (TAs). Notably, the majority of these attacks originate from China, highlighting the geographical impact of the issue.

Furthermore, on April 8, 2024, Cyble Researcher & Intelligence Labs (CRIL) observed a post on a prominent Russian cybercrime forum where a threat actor shared an exploit targeting D-Link NAS instances affected by CVE-2024-3273.

Source: NVD

The shared exploit demonstrated access to the root account, highlighting the severity of the vulnerabilities.

Affected products include D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L up to April 3, 2024. Moreover, Cyble researchers found 94,446 internet-exposed D-Link NAS devices, with concentrations in the United Kingdom, Thailand, Italy, Germany, and Hungary.

D-Link NAS Vulnerabilities and Mitigation Strategies

The exploitation of D-Link NAS devices poses a grave risk to organizations' security postures. As many affected devices have reached their End-of-Life (EOL) or End-of-Service (EOS) status, they lack firmware updates and adequate support, making them vulnerable to exploitation. Moreover, interconnectedness within networks amplifies the potential impact, exposing enterprises to risks.

The mitigation strategies for organizations facing critical D-Link NAS vulnerabilities include taking several key actions to mitigate risks and enhance their cybersecurity posture. Firstly, they should prioritize upgrading to supported versions or replacing End-of-Life (EOL) or End-of-Service (EOS) products with newer alternatives that receive regular security updates. 

Secondly, isolating EOL/EOS products into separate network segments can minimize exposure to threats and limit potential network impact. Additionally, deploying firewalls, intrusion detection systems (IDS), and network monitoring solutions can bolster overall security. Regular security assessments and vulnerability scans are essential for identifying and addressing weaknesses promptly. 

Developing and implementing risk mitigation plans, including contingency measures and business continuity strategies, is crucial. Maintaining communication with vendors for extended support options and collaborating with the cybersecurity community can further address concerns effectively. Lastly, educating users and administrators about the risks associated with unsupported software and promoting adherence to security best practices is essential for safeguarding organizational assets.


Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button