1.9 C
New York
Friday, January 31, 2025

Over 92,000 exposed D-Link NAS devices have a backdoor account

Must read

A menace researcher has disclosed a brand new arbitrary command injection and hardcoded backdoor flaw in a number of end-of-life D-Hyperlink Community Hooked up Storage (NAS) gadget fashions.

The researcher who found the flaw, ‘Netsecfish,’ explains that the problem resides throughout the’/cgi-bin/nas_sharing.cgi’ script, impacting its HTTP GET Request Handler element.

The 2 principal points contributing to the flaw, tracked as CVE-2024-3273, are a backdoor facilitated by means of a hardcoded account (username: “messagebus” and empty password) and a command injection drawback by way of the “system” parameter.

When chained collectively, any attacker can remotely execute instructions on the gadget.

- Advertisement -

The command injection flaw arises from including a base64-encoded command to the “system” parameter by way of an HTTP GET request, which is then executed.

Example of the malicious request
Instance of the malicious request (Netsecfish|GitHub)

“Profitable exploitation of this vulnerability might enable an attacker to execute arbitrary instructions on the system, probably resulting in unauthorized entry to delicate info, modification of system configurations, or denial of service situations,” warns the researcher.

The gadget fashions impacted by CVE-2024-3273 are:

  • DNS-320L Model 1.11, Model 1.03.0904.2013, Model 1.01.0702.2013
  • DNS-325 Model 1.01
  • DNS-327L Model 1.09, Model 1.00.0409.2013
  • DNS-340L Model 1.08

Netsecfish says community scans present over 92,000 weak D-Hyperlink NAS gadgets uncovered on-line and prone to assaults by means of these flaws.

Internet scan results
Web scan outcomes (Netsecfish|GitHub)

No patches out there

After contacting D-Hyperlink in regards to the flaw and whether or not a patch can be launched, the seller informed us that these NAS gadgets had reached the top of life (EOL) and are now not supported.

“All D-Hyperlink Community Hooked up storage has been Finish of Life and of Service Life for a few years [and] the sources related to these merchandise have ceased their improvement and are now not supported,” acknowledged the spokesperson.

See also  How Genesis AI Hurries up Robotics Coaching through 430,000x

“D-Hyperlink recommends retiring these merchandise and changing them with merchandise that obtain firmware updates.”

- Advertisement -

The spokesperson additionally informed BleepingComputer that the impacted gadgets would not have computerized on-line updating capabilities or buyer outreach options to ship notifications, like present fashions.

Therefore, the seller was restricted to a safety bulletin printed yesterday to boost consciousness in regards to the flaw and the necessity to retire or exchange these gadgets instantly.

D-Hyperlink has arrange a devoted assist web page for legacy gadgets the place house owners can navigate archives to seek out the newest safety and firmware updates.

Those that insist on utilizing outdated {hardware} ought to not less than apply the newest out there updates, even when these will not handle newly found issues like CVE-2024-3273.

Moreover, NAS gadgets ought to by no means be uncovered to the web as they’re generally focused to steal information or encrypt in ransomware assaults.

Related News

- Advertisement -
- Advertisement -

Latest News

- Advertisement -