CVE-2024-3272

D-Link Multiple NAS Devices — D-Link Multiple NAS Devices Use of Hard-Coded Credentials Vulnerability
🔥 CVSS 3.1  9.8 / 10 — CRITICAL 🔴 CISA Known Exploited Vulnerability

Overview

D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contains a hard-coded credential that allows an attacker to conduct authenticated command injection, leading to remote, unauthorized code execution.

https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383; https://nvd.nist.gov/vuln/detail/CVE-2024-3272

Key Details

PropertyValue
CVE ID CVE-2024-3272
Vendor / Product D-Link — Multiple NAS Devices
NVD Published2024-04-04
NVD Last Modified2025-10-30
CVSS 3.1 Score9.8
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
SeverityCRITICAL
CWE CWE-798
CISA KEV Added2024-04-11
CISA KEV Deadline2024-05-02
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2024-05-02. This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.

Timeline

DateEvent
2024-04-11Added to CISA Known Exploited Vulnerabilities catalog
2024-05-02CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2024-3272 Vulnerability Database
CISA KEV Catalog Entry US Government