Security for everyone

CVE-2019-16057 Scanner

Detects 'Remote Code Execution (RCE)' vulnerability in D-Link DNS-320 affects v. through 2.05.B10.

SCAN NOW

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Url

Toolbox

-

D-Link DNS-320 is a network-attached storage (NAS) device that is designed to provide centralized storage and backup capabilities to small to medium-sized businesses and home users. It offers up to two hard drive bays and allows users to store and share files, stream media, and even remotely access data via the internet. The device also comes equipped with a web interface that enables users to configure and manage the device's settings.

Unfortunately, the D-Link DNS-320 is vulnerable to a critical security flaw. This vulnerability, coded as CVE-2019-16057, allows remote attackers to inject malicious commands into the login_mgr.cgi script, which runs in the device's web interface. This can lead to remote code execution, which means that an attacker can take control of the NAS device and perform unauthorized actions, including stealing data, installing malware, or even launching attacks against other devices on the network.

This vulnerability can have severe consequences for users of the D-Link DNS-320. An attacker can gain access to confidential data, compromise the integrity of data stored on the device, and even cause permanent damage to the device. If the device is used in a business setting, the consequences can be even more severe, as the attacker can gain access to critical business data and cause system-wide disruptions.

In conclusion, the D-Link DNS-320 is a popular network-attached storage device that is vulnerable to a critical security flaw. Users of this device must take precautions to protect their data and systems from attackers who exploit this vulnerability. Thanks to the advanced security features of the securityforeveryone.com platform, users can easily and quickly learn about vulnerabilities in their digital assets and take proactive steps to secure them.

 

REFERENCES

cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture