www.greynoise.io Open in urlscan Pro
63.35.51.142  Public Scan

URL: https://www.greynoise.io/blog/cve-2024-3273-d-link-nas-rce-exploited-in-the-wild
Submission: On July 12 via api from IT — Scanned from IT

Form analysis 3 forms found in the DOM

/search

<form action="/search" class="nav-search w-form">
  <div class="nav-search-text">
    <div class="margin-bottom-0-5rem">Search plans and pricing, blog posts, company info, and more.</div>
  </div>
  <div class="nav-search-form"><input class="nav-search-input w-input" autofocus="true" maxlength="256" name="query" placeholder="Start your search here..." type="search" id="search" required=""><input type="submit" class="cta-button-small w-button"
      value="Search"></div>
  <div class="nav-search-text">
    <div>Hoping to access our Visualizer? <a href="https://viz.greynoise.io/" target="_blank">Go here instead</a>.</div>
  </div>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4282754/64495932-6892-4568-8bfc-8ff26d504367

<form id="hsForm_64495932-6892-4568-8bfc-8ff26d504367_follow-us-form" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4282754/64495932-6892-4568-8bfc-8ff26d504367"
  class="hs-form-private hsForm_64495932-6892-4568-8bfc-8ff26d504367 hs-form-64495932-6892-4568-8bfc-8ff26d504367 hs-form-64495932-6892-4568-8bfc-8ff26d504367_9e25f514-93fe-4be7-9b99-3b241c8b8903 hs-form stacked"
  target="target_iframe_64495932-6892-4568-8bfc-8ff26d504367_follow-us-form" data-instance-id="9e25f514-93fe-4be7-9b99-3b241c8b8903" data-form-id="64495932-6892-4568-8bfc-8ff26d504367" data-portal-id="4282754"
  data-test-id="hsForm_64495932-6892-4568-8bfc-8ff26d504367_follow-us-form">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-64495932-6892-4568-8bfc-8ff26d504367_follow-us-form" class="" placeholder="Enter your Email"
      for="email-64495932-6892-4568-8bfc-8ff26d504367_follow-us-form"><span>Email</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-64495932-6892-4568-8bfc-8ff26d504367_follow-us-form" name="email" required="" placeholder="Email address..." type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="SUBSCRIBE"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1720778714646&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1687962142134&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;embedType&quot;:&quot;REGULAR&quot;,&quot;clonedFromForm&quot;:&quot;13928cca-437a-4538-b318-8d77f18441bf&quot;,&quot;notifyHubSpotOwner&quot;:&quot;true&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;CVE-2024-3273: D-Link NAS RCE Exploited in the Wild | GreyNoise Blog&quot;,&quot;pageUrl&quot;:&quot;https://www.greynoise.io/blog/cve-2024-3273-d-link-nas-rce-exploited-in-the-wild&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:false,&quot;hutk&quot;:&quot;a02532041aea15965941ca73d0f70c68&quot;,&quot;__hsfp&quot;:3571879071,&quot;__hssc&quot;:&quot;9901034.1.1720778719146&quot;,&quot;__hstc&quot;:&quot;9901034.a02532041aea15965941ca73d0f70c68.1720778719146.1720778719146.1720778719146.1&quot;,&quot;formTarget&quot;:&quot;#hbspt-form-9e25f514-93fe-4be7-9b99-3b241c8b8903&quot;,&quot;formInstanceId&quot;:&quot;follow-us-form&quot;,&quot;rumScriptExecuteTime&quot;:3547.5,&quot;rumTotalRequestTime&quot;:5612.800003051758,&quot;rumTotalRenderTime&quot;:5703.400001525879,&quot;rumServiceResponseTime&quot;:2065.300003051758,&quot;rumFormRenderTime&quot;:90.5999984741211,&quot;connectionType&quot;:&quot;4g&quot;,&quot;firstContentfulPaint&quot;:0,&quot;largestContentfulPaint&quot;:0,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1720778719192,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;4282754&quot;,&quot;formId&quot;:&quot;64495932-6892-4568-8bfc-8ff26d504367&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hbspt-form-9e25f514-93fe-4be7-9b99-3b241c8b8903&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;formInstanceId&quot;:&quot;follow-us-form&quot;,&quot;isMobileResponsive&quot;:true},&quot;correlationId&quot;:&quot;9e25f514-93fe-4be7-9b99-3b241c8b8903&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.5387&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.5387&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;5387&quot;,&quot;allPageIds&quot;:{},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1720778714798,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;CVE-2024-3273: D-Link NAS RCE Exploited in the Wild | GreyNoise Blog\&quot;,\&quot;pageUrl\&quot;:\&quot;https://www.greynoise.io/blog/cve-2024-3273-d-link-nas-rce-exploited-in-the-wild\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:false}&quot;},{&quot;clientTimestamp&quot;:1720778714802,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;IT\&quot;&quot;},{&quot;clientTimestamp&quot;:1720778719172,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;a02532041aea15965941ca73d0f70c68\&quot;}&quot;}]}"><iframe
    name="target_iframe_64495932-6892-4568-8bfc-8ff26d504367_follow-us-form" style="display: none;"></iframe>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4282754/64495932-6892-4568-8bfc-8ff26d504367

<form id="hsForm_64495932-6892-4568-8bfc-8ff26d504367_subscribe-box-form" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4282754/64495932-6892-4568-8bfc-8ff26d504367"
  class="hs-form-private hsForm_64495932-6892-4568-8bfc-8ff26d504367 hs-form-64495932-6892-4568-8bfc-8ff26d504367 hs-form-64495932-6892-4568-8bfc-8ff26d504367_ede09dd7-eba3-4381-a509-8a93ae8d2dcb hs-form stacked"
  target="target_iframe_64495932-6892-4568-8bfc-8ff26d504367_subscribe-box-form" data-instance-id="ede09dd7-eba3-4381-a509-8a93ae8d2dcb" data-form-id="64495932-6892-4568-8bfc-8ff26d504367" data-portal-id="4282754"
  data-test-id="hsForm_64495932-6892-4568-8bfc-8ff26d504367_subscribe-box-form">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-64495932-6892-4568-8bfc-8ff26d504367_subscribe-box-form" class="" placeholder="Enter your Email"
      for="email-64495932-6892-4568-8bfc-8ff26d504367_subscribe-box-form"><span>Email</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-64495932-6892-4568-8bfc-8ff26d504367_subscribe-box-form" name="email" required="" placeholder="Email address..." type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="SUBSCRIBE"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1720778714869&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1687962142134&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;embedType&quot;:&quot;REGULAR&quot;,&quot;clonedFromForm&quot;:&quot;13928cca-437a-4538-b318-8d77f18441bf&quot;,&quot;notifyHubSpotOwner&quot;:&quot;true&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;CVE-2024-3273: D-Link NAS RCE Exploited in the Wild | GreyNoise Blog&quot;,&quot;pageUrl&quot;:&quot;https://www.greynoise.io/blog/cve-2024-3273-d-link-nas-rce-exploited-in-the-wild&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:false,&quot;hutk&quot;:&quot;a02532041aea15965941ca73d0f70c68&quot;,&quot;__hsfp&quot;:3571879071,&quot;__hssc&quot;:&quot;9901034.1.1720778719146&quot;,&quot;__hstc&quot;:&quot;9901034.a02532041aea15965941ca73d0f70c68.1720778719146.1720778719146.1720778719146.1&quot;,&quot;formTarget&quot;:&quot;#hbspt-form-ede09dd7-eba3-4381-a509-8a93ae8d2dcb&quot;,&quot;formInstanceId&quot;:&quot;subscribe-box-form&quot;,&quot;rumScriptExecuteTime&quot;:3786.699996948242,&quot;rumTotalRequestTime&quot;:5914.599998474121,&quot;rumTotalRenderTime&quot;:5936,&quot;rumServiceResponseTime&quot;:2127.900001525879,&quot;rumFormRenderTime&quot;:21.400001525878906,&quot;connectionType&quot;:&quot;4g&quot;,&quot;firstContentfulPaint&quot;:0,&quot;largestContentfulPaint&quot;:0,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1720778719202,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;4282754&quot;,&quot;formId&quot;:&quot;64495932-6892-4568-8bfc-8ff26d504367&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hbspt-form-ede09dd7-eba3-4381-a509-8a93ae8d2dcb&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;formInstanceId&quot;:&quot;subscribe-box-form&quot;,&quot;isMobileResponsive&quot;:true},&quot;correlationId&quot;:&quot;ede09dd7-eba3-4381-a509-8a93ae8d2dcb&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.5387&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.5387&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;5387&quot;,&quot;allPageIds&quot;:{},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1720778715103,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;CVE-2024-3273: D-Link NAS RCE Exploited in the Wild | GreyNoise Blog\&quot;,\&quot;pageUrl\&quot;:\&quot;https://www.greynoise.io/blog/cve-2024-3273-d-link-nas-rce-exploited-in-the-wild\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:false}&quot;},{&quot;clientTimestamp&quot;:1720778715105,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;IT\&quot;&quot;},{&quot;clientTimestamp&quot;:1720778719195,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;a02532041aea15965941ca73d0f70c68\&quot;}&quot;}]}"><iframe
    name="target_iframe_64495932-6892-4568-8bfc-8ff26d504367_subscribe-box-form" style="display: none;"></iframe>
</form>

Text Content

Our new report "Honeypots Are Back" is now available!
Download now
plansBlogIntegrationsDocumentationLog In
Product

GreyNoise identifies internet scanners and common business activity in your
security events so you can make confident decisions, faster!
Product Overview
Explore
SearchIP SimilarityTrends
Investigate
IP TimelineIP DetailsTag Details
Act
BlocklistsAlerts
Integrate
IntegrationsAPI
Solutions

GreyNoise deploys solutions tailored to the needs of specific industries and use
cases.
Maximize SOC EfficiencyMass Exploitation DefenseContextualized Threat Hunting

Resources

Checkout our demos, case studies, and more to help you expand your skills.
Featured Content
How I Use GreyNoise (video)CyberWire: Hacking Humans #199 (podcast)
GreyNoise Resources
Resources HubStorm WatchCommunityTag RequestROI CalculatorGlossary of Terms
Company

GreyNoise collects, analyzes, and labels data on IPs that scan the internet and
saturate security tools with noise.
Press Room
GreyNoise in the NewsPress ReleasesGreyNoise Community Love
EventsRequest GreyNoise SwagCareers at GreyNoiseContact Us
Partners

Expand your reach, increase revenues, and deepen customer relationships by
partnering with GreyNoise.
GreyNoise PartnersReseller PartnersTechnical AlliancesOEM PartnersMSSPs & MDRs
Explore Our Data
Explore Our Data
Product

Product Overview
Explore
SearchIP SimilarityTrends
Investigate
IP TimelineIP DetailsTag Details
Act
BlocklistsAlerts
Integrate
APIIntegrations
Solutions

Automated Alert ReductionMaximize SOC EfficiencyMass Exploitation Defense
Resources

Resources HubStorm WatchCommunityTag RequestROI CalculatorGlossary of Terms
Company

Press Room
GreyNoise in the NewsPress ReleasesGreyNoise Community Love
More
EventsRequest GreyNoise SwagCareers at GreyNoiseContact Us
Partners

GreyNoise PartnersReseller PartnersTechnical AlliancesOEM PartnersMSSPs & MDRs
PricingBlogintegrationsDocumentationLog In

Search plans and pricing, blog posts, company info, and more.

Hoping to access our Visualizer? Go here instead.

Blog
>
Vulnerabilities
Follow us
Follow us and don’t miss a thing.

Get the latest blog articles delivered right to your inbox.
Email*


Vulnerabilities
Labs


CVE-2024-3273: D-LINK NAS RCE EXPLOITED IN THE WILD

Matthew Remacle

April 8, 2024



A remote code execution vulnerability in D-Link NAS devices is actively being
exploited and is tracked under CVE-2024-3273. The vulnerability is believed to
affect as many as 92,000 devices and further information can be found on
D-Link’s support announcement.

(04/11/2024): CLARIFICATION ON CVE-2024-3273 & CVE-2024-3272

Exploitation of the CVE-2024-3273 command injection vulnerability requires the
two valid `user=` and `passwd=` parameters. There is a companion vulnerability
tracked as CVE-2024-3272 and describes the issue as "manipulation of the
argument user with the input messagebus leads to hard-coded credentials". It is
important to note that the "credentials" as described are only the username for
the user "messagebus".

"messagebus" is not a backdoor account. It is one of many common pre-configured
linux system users that functionally cannot "log in", and thus have no password.
Other common example system users include avahi, syslog, nobody, ntp, rtkit, and
whoopsie. D-Link correctly validates that the username exists and also correctly
validates that the provided password is correct. The logic flaw exercised by
CVE-2024-3273 is that the empty (correct) password for the "messagebus" user is
never validated that the user should ever be able to log in using a password, if
at all.

(04/09/2024): UPDATE ON NUMBER OF VULNERABLE DEVICES

Upon further analysis, it appears the number of vulnerable devices is much lower
than initially reported.  According to our friends at Censys, the number is
closer to 5,500 devices.


VIEW TAG

‍

GreyNoise quickly released a tag for tracking under D-Link NAS CVE-2024-3273 RCE
Attempt, which was relatively easy for us because our Sift tooling surfaced the
exploit to us automatically. Sift curates a report of new/interesting traffic
observed by GreyNoise sensors daily after doing much of the analysis and triage
work itself.

You can read more about Sift and check it out for yourself at
https://sift.labs.greynoise.io/

‍



‍

Sift’s analysis above is correct! Taking it a step further, the command the
above IP is attempting to execute is a generic shell script pattern used by
botnet operators to try to execute malware for every possible CPU architecture
in the expectation that at least one will work. The malware is fetched from
38[.]6[.]224[.]248 over HTTP.

We have retrieved the sample skid.x86 and uploaded it to VirusTotal for sharing
and further analysis:

 * https://www.virustotal.com/gui/file/859e679f8e8be4a4c895139fb7fb1b177627bbe712e1ed4c316ec85008426db8

‍

This article is a summary of the full, in-depth version on the GreyNoise Labs
blog.
Read the full report
Like or share:



GET THE LATEST BLOG ARTICLES DELIVERED RIGHT TO YOUR INBOX.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Email*


Be part of the conversation in our Community Slack group.
Join us on Slack
Follow us and don’t miss a thing.



RELATED CONTENT

View all related articles
Vulnerabilities


PERMA-VULN: D-LINK DIR-859, CVE-2024-0769

The GreyNoise Labs Team

Jun 27, 2024
Vulnerabilities
Labs


SOLARWINDS SERV-U (CVE-2024-28995) EXPLOITATION: WE SEE YOU!

Ron Bowes

Jun 18, 2024
Vulnerabilities


WHAT'S GOING ON WITH CVE-2024-4577 (CRITICAL RCE IN PHP)?

Konstantin Lazarev

Jun 13, 2024

Vulnerabilities
Labs
Solutions
Accelerated Alert TriageMass Exploitation DefenseContextualized Threat Hunting
Company
NewsPress ReleasesCommunity LoveEventsRequest SwagCareersContact
Resources
Resource HubStorm WatchCommunityTag RequestROI CalculatorGlossary of Terms
Partners
GreyNoise PartnersReseller PartnersTechnical AlliancesOEM PartnersMSSPS & MDRS
PlansBlogDocumentationLog In
© 2023 GreyNoise, Inc. All Rights Reserved.
Terms
|
Privacy
|
Security
|
Cookies
|
Patents
|
Principles
Cookie Settings
We use cookies to ensure you get the best experience on our website. Learn more
Got It