[Exploit] CVE-2024-3273 : Remote Command Injection
by trampoline - Sunday April 7, 2024 at 07:31 AM
#21
Thank you so much for your kindness and support. I truly appreciate it!
Reply
#22
awesome finding
Reply
#23
Thanks for the share
Reply
#24
(04-07-2024, 07:31 AM)trampoline Wrote: This script exploits CVE-2024-3273 vulnerability found in specific versions of D-Link NAS devices. (D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403.)

It enables command execution and unauthorized access to the affected devices.

NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The vendor was contacted early and confirmed immediately that the product is end-of-life, so there's no option to patch this vulnerability. 



PS: I dont own source; only sharing for those who need.

lets see thanks
Reply
#25
How to create vulunslist.txt for poc used. I need shodan scraper recommand meeee
Reply
#26
thank youuuuuuuuuu
Reply
#27
thanks and let me check
Reply
#28
Thanks, ill check this out
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Leeching | http://breachddyfwvcp4kzccos5oxtdbssmfbp...an-Appeals if you feel this is incorrect.
Reply
#29
Interesting, Julien aime les gosses
Reply
#30
Some of them already patched
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Leeching | http://breachddyfwvcp4kzccos5oxtdbssmfbp...an-Appeals if you feel this is incorrect.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Help Microsoft Teams Gif Exploit guniess0x 0 3 7 hours ago
Last Post: guniess0x
  Google Dorks for finding SQL injection vulnerabilities and other security issues 1yush 64 2,429 03-28-2026, 05:09 PM
Last Post: Wayama
  Ban Any Discord Exploit PhineasFisher 6 295 02-08-2026, 11:49 PM
Last Post: skype
  Cool Remote Patching ETW/Amsi PoC pepeloco 6 2,092 02-08-2026, 07:58 AM
Last Post: zeroday99
  CVE-2025-40554 - SolarWinds Web Help Desk Auth Bypass & RCE PoC miyako 3 73 02-07-2026, 03:32 PM
Last Post: cysc



 Users browsing this thread: