ClickCease

Meet Armis at SecTor 2024

Learn More

D-LINK Command Injection Vulnerability

(CVE-2024-3273)
Early Warning
2 Days Earlier

D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L contain a command injection vulnerability. When combined with CVE-2024-3272, this can lead to remote, unauthorized code execution. Patching the command injection vulnerability in D-Link DNS-320L, DNS-325, DNS-327L, and DNS-340L devices is important to avoid severe consequences, including:

  1. Prevent Remote Code Execution
  2. Protect Sensitive Data
  3. Ensure System Integrity
  4. Prevent Service Disruption
  5. Mitigate Spread of Malware
  6. Protect Network Security
  7. Maintain Trust and Reputation
  8. Compliance with Security Standards
  9. Financial Impact
  10. Reduce Attack Surface
  11. Prevent Unauthorized Access

It is crucial to address this vulnerability immediately.

Armis identified this risk 2 days earlier for our customers:

  • CISA KEV Date: April 11, 2024
  • Armis Labs: April 9, 2024