IoT Security

Flaw Gives Hackers Remote Access to Files Stored on D-Link DNS-320 Devices

D-Link DNS-320 ShareCenter network-attached storage (NAS) devices are affected by a critical vulnerability that can be exploited remotely to take complete control of a device and access the files stored on it.

<p><strong><span><span>D-Link DNS-320 ShareCenter network-attached storage (NAS) devices are affected by a critical vulnerability that can be exploited remotely to take complete control of a device and access the files stored on it.</span></span></strong></p>

D-Link DNS-320 ShareCenter network-attached storage (NAS) devices are affected by a critical vulnerability that can be exploited remotely to take complete control of a device and access the files stored on it.

Researchers at Vietnam-based CyStack Security discovered the vulnerability and reported it to D-Link in mid-August. An advisory was released by the vendor roughly one month later, but it turned out that the security hole was actually fixed by mistake in April, when D-Link released version 2.06b01 of the firmware to address a weakness exploited by the Cr1ptT0r ransomware to infect D-Link NAS devices.

The flaw is tracked as CVE-2019-16057 and CyStack assigned it a CVSS score of 10. It affects D-Link DNS-320 devices with firmware version 2.05b10 and earlier.

CyStack’s Nguyen Dang told SecurityWeek that the vulnerability can be exploited directly from the internet and he says there are currently at least 800 vulnerable devices that can be attacked from the web. Nguyen pointed out that all D-Link DNS-320 devices were vulnerable to attacks before the issue was patched in April.

The vulnerability has been described as a command injection issue present in the login module for the administration interface of the DNS-320.

The affected module, /cgi/login_mgr.cgi, includes a parameter named “port” that can be poisoned. An unauthenticated attacker can abuse this to execute arbitrary commands with root permission, which allows them to take complete control of a targeted device and the files it stores.

CyStack has published a technical blog post describing the vulnerability and how it was discovered by its researchers.

Related: FTC, D-Link Reach Agreement Over Device Security

Related: Credential Leaking Vulnerabilities Impact Comba, D-Link Routers

Advertisement. Scroll to continue reading.

Related: Hackers Using Stolen D-Link Certificates for Malware Signing

Related: Critical Vulnerabilities Allow Takeover of D-Link Routers

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version