Tuesday, October 20, 12:03
Home security Defective leaves vulnerable D-Link DNS-320 devices

Defective leaves vulnerable D-Link DNS-320 devices


D-Link DNS-320 devices have been found to be dangerous vulnerability, which can allow hacker to take control of such a remote device and access the files stored there.

Researchers at CyStack Security, based in Vietnam, discovered and reported the vulnerability in mid-August. About a month later the provider was released instructions about the vulnerability, but it turned out that the security flaw was actually fixed by mistake in April, when D-Link released its 2.06b01 version firmware, to address a vulnerability exploited by Cr1ptT0r ransomware to infect D-Link NAS devices.

The CVE-2019-16057 flaw has been rated CVSS 10 by CyStack. It affects D-Link DNS-320 devices with firmware version 2.05b10 and later.

CyStack's Nguyen Dang told SecurityWeek that vulnerability can be exploited directly by Internet and says there are at least 800 vulnerable devices that can crash victims attack by website. Nguyen noted that all D-Link DNS-320 devices were vulnerable to attacks before the problem was resolved in April.

The vulnerability has been described as a command injection issue that exists in the connection module for the DNS-320 management interface.

The affected section, /cgi/login_mgr.cgi, includes a parameter named "port" that can be affected. An unauthorized intruder can abuse this parameter to execute arbitrary permissions with permissions root, which allow him to take full control of a targeted device and the files stored on it.

CyStack published a blog post describing the vulnerability and how the researchers discovered its existence.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement


US: accuse Russians of global attacks

Six Russian agents have been indicted by the US Department of Justice for attacks related to the Winter Olympics in Pyeongchang, ...

Hackers hijack Telegram via an SS7 attack

Hackers with access to the Signaling System 7 (SS7) used to connect to mobile networks around the world were able to ...

Windows GravityRAT malware now targets Android and macOS

GravityRAT, a malware that monitors the CPU temperature of Windows computers to detect virtual machines or sandboxes, has acquired additional ...

DDoS attacks tripled, forcing victims to pay a ransom

The last quarter of 2020 saw a wave of web application attacks that have used ransom letters to target companies in various industries ....

Phishing campaign violates Office 365 accounts through OAuth app

Security researchers have discovered a new phishing campaign that uses a Coinbase-themed email. Target of the hackers behind the campaign, ...

A hacking team donated money stolen from attacks

A hacking team donated some of the money it stole from companies to charities. This is an unprecedented case that raises ...

Instagram: Investigated by the EU for child data protection

Instagram is under investigation by the EU, as it allegedly failed to ensure the protection of children's data on its platform ....

Ransomware attack "cost" $ 300.000 in Mississippi schools!

A Mississippi school district voted to pay $ 300.000 to recover files encrypted during an ransomware attack. A...

Russian hackers were planning attacks at the Tokyo Olympics!

The UK government said yesterday that Russian hackers were preparing cyber-attacks against the organizers of the Olympic and Paralympic Games ...

Windows 10: Microsoft has released a new task manager for gamers

If your computer games are slow or slow, you can free up resources in Windows 10 using the new task manager ...