D-Link has no plans to patch a critical vulnerability that was discovered in its legacy network-attached storage (NAS) systems that allows command injection via an exploit. Instead, the manufacturer recommends that owners of affected devices switch to newer models that are not affected by this issue.
We are talking about the vulnerability CVE-2024-10914, which received a critical severity rating of 9.2 points and was discovered by Netsecfish specialists. The vulnerability is present in the account_mgr.cgi script, where an attacker can adjust the name parameter in a special way to perform an exploit. In other words, an unauthenticated user has the ability to inject arbitrary shell commands by sending HTTP GET requests to the affected device.
The message says that the problem affects several D-Link network storage models: DNS-320 version 1.00, DNS-320LW version 1.01.0914.2012, DNS-325 version 1.01 and DNS-340L version 1.08. The bad news for users of these devices is that D-Link does not intend to release a patch to fix the mentioned vulnerability. This is because all affected NAS devices have reached the end of their support period and are no longer receiving software update updates.
The manufacturer recommends that owners of affected NAS devices quickly switch to using more current models. Those who cannot do this quickly should isolate their devices from the Internet or set stricter access rules for them. You can also try to find alternative firmware from third-party developers, but in this case, before downloading it, you should make sure that the firmware is reliable and secure.