{"uuid": "e3e7780b-c86a-4bab-94a3-568f48b9fe4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3273", "type": "published-proof-of-concept", "source": "https://t.me/lostsec/332", "content": "D-Link NAS CVE-2024-3273 [Latest]\n\nThe vulnerability affects the following versions of D-Link NAS devices:\n\nDNS-320L Version 1.11, Version1.03.0904.2013, Version1.01.0702.2013\nDNS-325 Version 1.01\nDNS-327L Version 1.09, Version1.00.0409.2013\nDNS-340L Version 1.08\n\nHow to find:\ngoto https://en.fofa.info\n\nsearch:\napp=\"D_Link-DNS-ShareCenter\"\n\nclick on the ip you get login pannel access just copy url and paste in the given script.\n\ncve exploit: https://github.com/Chocapikk/CVE-2024-3273\nThanks to curbed #CR for giving me info about cve", "creation_timestamp": "2024-04-07T17:57:14.000000Z"}