2024: D-Link NAS Devices Found with Critical Security Flaw

In 2024, significant security vulnerabilities in certain D-Link NAS devices were exposed, raising critical data protection concerns for users.
2024: D-Link NAS Devices Found with Critical Security Flaw

Table of Contents

When it comes to household wireless router brands, many people would first think of TP-Link, a household name.

In fact, years ago, there was another brand that was comparable in popularity: D-Link. Although D-Link is not as prominent as it once was, it still exists and thrives, and it is the focus of this article.

So, why bring up D-Link now? Has it recently released any innovative products?

The answer is no. The reason for mentioning it is that a security agency has recently discovered serious vulnerabilities in some of D-Link’s NAS products. This security vulnerability, identified as “CVE-2024-10914,” has a severity score of 9.2, classifying it as a high-risk vulnerability.

What are the dangers of this vulnerability? It resides in the account_mgr.cgi script, where malicious attackers can exploit it by inserting malicious input into the name parameter and executing commands via HTTP GET requests, thus enabling injection attacks.

The presence of this vulnerability has been confirmed, and the affected D-Link NAS models include DNS-320 version 1.00, DNS-320LW version 1.01.0914.2012, DNS-325 versions 1.01 and 1.02, and DNS-340L version 1.08.

At this point, some might say:

Security vulnerabilities are normal; no manufacturer can guarantee that their products will be 100% free of them. If a vulnerability is found, the manufacturer just needs to release an update patch to fix it. However, the situation with the CVE-2024-10914 vulnerability is not so straightforward.

The D-Link NAS products with these vulnerabilities are older models that reached or exceeded their promised support period over four years ago. As a result, D-Link has stated that it will not release a patch to fix the CVE-2024-10914 vulnerability and advises users to stop using these products.

This means that D-Link will not provide a security patch to address the vulnerability. In this situation, users of the aforementioned D-Link NAS models must take this seriously.

Whether for home or business use, NAS devices often serve as data storage hubs and may hold a large amount of critical, sensitive information. The mechanism behind the CVE-2024-10914 vulnerability is now publicly known, and the possibility of an attack exploiting it objectively exists, so it is vital not to be complacent.

The simplest solution is, as D-Link recommends, to discontinue and replace these vulnerable NAS products entirely. However, this may be costly.

If immediate replacement is not feasible and continued use is necessary, it is advisable for users to adjust certain security settings on the NAS, such as restricting access to trusted IP addresses only and isolating the NAS from the internet to ensure that only authorized users can access it.

Time flies—back in the 2000s, the author even used D-Link switches. Now, 20 years later, it’s surprising that attention to the D-Link brand comes in the context of a security vulnerability, which is somewhat awkward. Hopefully, D-Link will learn from this, continually improve, and ensure the performance, user experience, and security of its products.

End-of-DiskMFR-blog

Disclaimer:

  1. This channel does not make any representations or warranties regarding the availability, accuracy, timeliness, effectiveness, or completeness of any information posted. It hereby disclaims any liability or consequences arising from the use of the information.
  2. This channel is non-commercial and non-profit. The re-posted content does not signify endorsement of its views or responsibility for its authenticity. It does not intend to constitute any other guidance. This channel is not liable for any inaccuracies or errors in the re-posted or published information, directly or indirectly.
  3. Some data, materials, text, images, etc., used in this channel are sourced from the internet, and all reposts are duly credited to their sources. If you discover any work that infringes on your intellectual property rights or personal legal interests, please contact us, and we will promptly modify or remove it.
DiskMFR Field Sales Manager - Leo

It’s Leo Zhi. He was born on August 1987. Major in Electronic Engineering & Business English, He is an Enthusiastic professional, a responsible person, and computer hardware & software literate. Proficient in NAND flash products for more than 10 years, critical thinking skills, outstanding leadership, excellent Teamwork, and interpersonal skills.  Understanding customer technical queries and issues, providing initial analysis and solutions. If you have any queries, Please feel free to let me know, Thanks

Please let us know what you require, and you will get our reply within 24 hours.









    Our team will answer your inquiries within 24 hours.
    Your information will be kept strictly confidential.

    • Our team will answer your inquiries within 24 hours.
    • Your information will be kept strictly confidential.

    Let's Have A Chat

    Learn How We Served 100+ Global Device Brands with our Products & Get Free Sample!!!

    Email Popup Background 2