#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

37 C
Dubai
Tuesday, July 22, 2025
HomeTechnology & TelecomCritical Command Injection Vulnerability Found in D-Link NAS Devices Reaching End-of-Life: CVE-2024-10914

Critical Command Injection Vulnerability Found in D-Link NAS Devices Reaching End-of-Life: CVE-2024-10914

Date:

Related stories

Phish and Chips: China‑Aligned Espionage Surge Targeting Taiwan Semiconductor Industry

Between March and June 2025, Proofpoint researchers tracked three distinct...

Emergency Alert: Critical Unauthenticated RCE Discovered in Cisco ISE/ISE‑PIC

Cisco has patched three severe unauthenticated remote code execution...
spot_imgspot_imgspot_imgspot_img

A recent discovery has revealed a serious vulnerability affecting legacy D-Link NAS (Network Attached Storage) models, including DNS-320, DNS-325, DNS-340L, and others that have reached End-of-Life (EOL) and End-of-Service (EOS) status. Classified as CVE-2024-10914, this command injection vulnerability is linked to the account_mgr CGI script, where inadequate input sanitization allows remote attackers to exploit the system. Due to these models being EOL, they are no longer supported or updated by D-Link, leaving users exposed to significant security risks.

Vulnerability Overview: CVE-2024-10914

The vulnerability, CVE-2024-10914, has been identified as a command injection flaw (CWE-77) affecting D-Link NAS devices through the account_mgr script. Specifically, this security gap exists in the cgi_user_add command, where user input in the name parameter is not properly sanitized. This deficiency enables an attacker to inject arbitrary commands, potentially allowing full control over the device.

Impacted Models and Versions

This vulnerability affects multiple D-Link NAS devices that have been marked as EOL, including:

  • DNS-320 (Version 1.00)
  • DNS-320LW (Version 1.01.0914.2012)
  • DNS-325 (Versions 1.01, 1.02)
  • DNS-340L (Version 1.08)

These devices have long served as popular options for home and small business storage needs, but with the end of their lifecycle, they no longer receive firmware updates or security patches, increasing their susceptibility to exploitation.

Consequences of End-of-Life Status

D-Link’s policy, similar to many other tech companies, is to cease support for EOL devices, which involves halting firmware updates and discontinuing technical support. This places users who continue to use these devices at significant risk of security vulnerabilities that can no longer be mitigated through official updates.

Attackers exploiting CVE-2024-10914 can potentially execute commands on these NAS devices, allowing them to:

  1. Control Files and Data: Manipulate or steal data stored on the NAS device.
  2. Compromise Connected Devices: Spread malware or other malicious files to devices on the same network.
  3. Establish a Persistent Presence: Use the NAS device as an entry point for further network exploitation.

Technical Breakdown of the Command Injection Flaw

The vulnerability occurs in the NAS’s CGI interface, where the cgi_user_add command of the account_mgr script processes user-supplied input without verifying its contents. This means that maliciously crafted commands can be embedded within the name parameter, granting the attacker the ability to execute arbitrary code with administrative privileges. Such command injection flaws are particularly dangerous as they bypass standard security protections and firewall configurations.

Why This Matters for Cybersecurity Professionals

For cybersecurity professionals and network administrators, this vulnerability highlights the dangers associated with using outdated and unsupported devices within an organization. While many organizations focus on patching newer systems, legacy devices are often overlooked, potentially becoming the weakest link in a network.

EOL/EOS Models (Including affected Models)

ModelRegionHardware RevisionEnd of Service Life
ConclusionLast Updated
DNS-120All RegionsAll H/W Revisions01/01/09 : LinkRetire & Replace Device08/14/2024
DNR-202LAll RegionsAll H/W Revisions06/30/2020 : LinkRetire & Replace Device08/14/2024
DNS-315L
Non-USAll H/W Revisions09/11/2014Retire & Replace Device08/14/2024
DNS-320All RegionsAll H/W Revisions12/1/2018 : Link
Retire & Replace Device08/14/2024
DNS-320LAll RegionsAll H/W Revisions05/31/2020 : LinkRetire & Replace Device
08/14/2024
DNS-320LW Non-US All H/W Revisions05/31/2020 Retire & Replace Device08/14/2024
DNS-321All RegionsAll H/W Revisions5/5/2013: LinkRetire & Replace Device08/14/2024
DNR-322LAll RegionsAll H/W Revisions11/30/2021 : Link
Retire & Replace Device08/14/2024
DNS-323All RegionsAll H/W Revisions5/5/2013 : Link
Retire & Replace Device08/14/2024
DNS-325All RegionsAll H/W Revisions09/01/2017 : LinkRetire & Replace Device08/14/2024
DNS-326All RegionsAll H/W Revisions6/30/2013 : LinkRetire & Replace Device08/14/2024
DNS-327LAll RegionsAll H/W Revisions05/31/2020 : Link
Retire & Replace Device08/14/2024
DNR-326All RegionsAll H/W Revisions2/28/2018 : Link
Retire & Replace Device08/14/2024
DNS-340LAll RegionsAll H/W Revisions07/31/2019 : LinkRetire & Replace Device08/14/2024
DNS-343All RegionsAll H/W Revisions2/28/2020 : Link
Retire & Replace Device08/14/2024
DNS-345All RegionsAll H/W Revisions2/1/2019 : Link
Retire & Replace Device08/14/2024
DNS-726-4All RegionsAll H/W Revisions7/1/2014 : Link
Retire & Replace Device08/14/2024
DNS-1100-4All RegionsAll H/W Revisions6/1/2018 : Link
Retire & Replace Device08/14/2024
DNS-1200-05All RegionsAll H/W Revisions4/30/2020 : Link
Retire & Replace Device08/14/2024
DNS-1550-04All RegionsAll H/W Revisions4/30/2020 : Link
Retire & Replace Device08/14/2024
D-Link

Recommendations and Best Practices

Although D-Link strongly recommends replacing these EOL NAS devices, users who continue to operate them can adopt the following cybersecurity practices to reduce the associated risks:

  1. Replace or Upgrade Outdated Devices
    The most secure option is to replace EOL devices with modern alternatives that receive regular security patches.
  2. Limit Device Access
    Restrict device access to internal networks only, ensuring no direct connection to the internet. Implement network segmentation to isolate the NAS from critical assets.
  3. Use Strong, Unique Passwords
    Ensure that NAS administrative accounts and connected devices use complex, unique passwords to reduce the risk of unauthorized access.
  4. Implement Firewall Rules and Network Filtering
    Configure firewalls to block unauthorized traffic to and from NAS devices. Only allow trusted IPs or ranges to access the device.
  5. Disable Unnecessary Services
    Disable any unused or unnecessary services on the NAS, reducing the number of possible entry points for attackers.
  6. Monitor Device and Network Traffic
    Regularly monitor logs for unusual activities, such as unexpected login attempts, new processes, or outbound traffic from the NAS device.
  7. Enable Multi-Factor Authentication (MFA)
    If available, enable MFA for NAS administrative access. This adds an extra layer of security beyond simple password protection.
  8. Use Network Access Control (NAC) Solutions
    Implement NAC to limit device access to the network and enforce strict controls for which devices are allowed to communicate with the NAS.
  9. Regularly Backup Data
    Maintain regular backups of NAS data in an encrypted, off-network location. This ensures that data can be recovered in the event of a breach or ransomware attack.
  10. Apply Third-Party Firmware (with Caution)
    For tech-savvy users, third-party firmware options, such as DD-WRT, may offer additional security features. However, using these voids any warranty and should only be considered by knowledgeable users.

Conclusion

The command injection vulnerability in D-Link’s EOL NAS devices underscores the importance of proactive device lifecycle management. As these models no longer receive security updates, they represent a persistent vulnerability for users who continue to rely on them. For the most robust protection, users are advised to replace outdated NAS models with up-to-date solutions.

Cybersecurity professionals must remain vigilant in auditing network assets and identifying legacy devices within their environments. With a proactive approach to vulnerability management and the adoption of secure configuration practices, organizations can minimize their exposure to critical flaws like CVE-2024-10914.

Want to stay on top of cybersecurity news? Follow us on Facebook, X (Twitter), Instagram, and LinkedIn for the latest threats, insights, and updates!

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here