Monday, May 5, 2025
HomeCyber Security NewsCritical Vulnerability in D-link DNS-320 Devices let Hackers to Execute Remote Code...

Critical Vulnerability in D-link DNS-320 Devices let Hackers to Execute Remote Code and to Steal Data

Published on

SIEM as a Service

Follow Us on Google News

D-link DNS-320 Devices have used as an ideal backup solution, it offers an effective way to share documents, music, videos, and photos with anyone that connected in your network.

CyStack security researcher, Trung Nguyen, detected a remote code execution vulnerability in DNS-320 sharecenter devices that let the user’ s data vulnerable to remote hackers. The vulnerability can be tracked as CVE-2019-16057.

Unauthenticated RCE – DNS-320 Sharecenter Devices

The vulnerability resides in the login module of DNS-320 devices, by exploiting this vulnerability attackers could gain access to the devices remotely and control devices by executing arbitrary code.

- Advertisement - Google News

According to CyStack report shared with GBHackers On Security, the critical vulnerability in the device allows an unauthenticated attacker to “access to all application commands with root permission”.

D-link DNS-320 ShareCenter Login

The vulnerability rated as critical receives CVSSv2 base score 10.0, and it affects DNS-320 sharecenter Devices with version equals 2.05.B10 or lower.

According to Trung, by targeting binary /cgi/login_mgr.cgi which handles login requests, attackers may poison the parameter port and perform an RCE attack.

“Let’s take a look at sub_9924(). We can see that if an attacker controls parameter v1 which stands for the port, he will be able to arbitrarily execute commands, which is the key point in this vulnerability.” He explained

The vulnerability was reported to D-link by CyStack security team, but it was unknowingly patched in April 2019 release. D-link also published a report.

D-link DNS-320’s users are urged to update their devices’ firmware to the latest version.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity news updates

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Multiple Flaws in Tenda RX2 Pro Let Attackers Gain Admin Access

Security researchers have uncovered a series of critical vulnerabilities in the Tenda RX2 Pro...

Hackers Exploit Email Fields to Launch XSS and SSRF Attacks

Cybersecurity researchers are raising alarms as hackers increasingly weaponize email input fields to execute cross-site...

Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims

A recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed...

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control

Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the "SonicBoom Attack Chain,"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Multiple Flaws in Tenda RX2 Pro Let Attackers Gain Admin Access

Security researchers have uncovered a series of critical vulnerabilities in the Tenda RX2 Pro...

Hackers Exploit Email Fields to Launch XSS and SSRF Attacks

Cybersecurity researchers are raising alarms as hackers increasingly weaponize email input fields to execute cross-site...

Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims

A recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed...