Heimdal Security Blog

92,000 D-Link NAS Devices Vulnerable to Remote Code Execution

D link NAS device vulnerable

Researchers warn zero-day vulnerability exposes End-Of-Life (EOL) D-Link network attached storage devices (NAS) to remote code execution.

CVE-2024-3273 enables hackers to backdoor the equipment and compromise sensitive data.

The D-Link NAS vulnerability explained

There are two security issues in the EOL D-Link NAS models:

The security researcher who revealed the vulnerability on GitHub, netsecfish, said the nas_sharing.cgi CGI script is at fault. He demonstrated how an attacker could exploit the issues by crafting a malicious HTTP Request.

Source – GitHub post

What do EOL D-Link NAS users risk

According to the netsecfish’s report, the following models are vulnerable:

All the above devices have reached End of Life, which means the vendor no longer supports them. Exploiting a network-attached storage device can impact all other endpoints that connect to it.

Since there will be no patch for CVE-2024-3273, users should stop using EOL D-Link NAS models.

If hackers chain the two vulnerabilities, the backdoor and the command injection, they can:

In their Security Announcement, the vendor advises:

D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it.

Source – D-Link Security Announcement

They also recommend, for those users who can’t replace EOL equipment:

At the moment, 92,000 vulnerable D-Link network attached storages are still online.

How to Deal with Legacy Devices Safely?

There are two main reasons why a company would expose to cybersecurity attacks by continuing to use EOL devices:

To mitigate the risk of allowing vulnerable EOL legacy devices on your network, I recommend you use a patch and asset management tool. Asset tracking will get you full visibility across all endpoints that are part of your infrastructure. Read more about it here.

If you liked this article, follow us on LinkedIn, Twitter, Facebook, and Youtube, for more cybersecurity news and topics.