Severity
6.9MEDIUM
EPSS
2.2%
top 15.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 6

Description

A vulnerability classified as problematic has been found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. This affects an unknown part of the file /xml/info.xml of the component HTTP GET Request Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Packages4 packages

CVEListV5d-link/dns-340l20241028
CVEListV5d-link/dns-320lw20241028
CVEListV5d-link/dns-32020241028
CVEListV5d-link/dns-32520241028

🔴Vulnerability Details

2
GHSA
GHSA-fj2w-q5f7-w82f: A vulnerability classified as problematic has been found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 202410282024-11-06
CVEList
D-Link DNS-320/DNS-320LW/DNS-325/DNS-340L HTTP GET Request info.xml information disclosure2024-11-06
CVE-2024-10916 (MEDIUM CVSS 6.9) | A vulnerability classified as probl | cvebase.io