CVE-2024-8460 D-Link DNS-320 2.02b01 WebMgmt Remote Info Disclosure via widget_api
CVE-2024-8460 Published on September 5, 2024
D-Link DNS-320 Web Management Interface widget_api.cgi information disclosure
A vulnerability, which was classified as problematic, has been found in D-Link DNS-320 2.02b01. Affected by this issue is some unknown functionality of the file /cgi-bin/widget_api.cgi of the component Web Management Interface. The manipulation of the argument getHD/getSer/getSys leads to information disclosure. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
Timeline
Advisory disclosed
VulDB entry created
VulDB entry last update
Weakness Type
What is an Information Disclosure Vulnerability?
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
CVE-2024-8460 has been classified to as an Information Disclosure vulnerability or weakness.
Products Associated with CVE-2024-8460
Want to know whenever a new CVE is published for D-Link Dns 320 Firmware? stack.watch will email you.
Affected Versions
D-Link DNS-320:- Version 2.02b01 is affected.
- Version 2.02b01 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.