{"vulnerability": "CVE-2024-3272", "sightings": [{"uuid": "c42cfde3-e146-41af-bebd-45483bbde126", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-04-11T21:10:02.000000Z"}, {"uuid": "2ea28a29-72fe-4b46-b6f1-67c87ab39a58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:13:12.000000Z"}, {"uuid": "58bffe4f-1beb-4974-a780-e7e8b9873b5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ls5h7oa5mr2u", "content": "", "creation_timestamp": "2025-06-21T21:02:24.818589Z"}, {"uuid": "d35240ec-bae9-4d8a-b39a-6c1ff6c4bd59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:53.000000Z"}, {"uuid": "e1c8da0e-1e75-4e7c-a8aa-9f98b2c2059c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-3272.yaml", "content": "", "creation_timestamp": "2025-06-19T13:57:52.000000Z"}, {"uuid": "f5d0700b-51a1-4276-b30d-aeba8e01bc40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lv76464obo2e", "content": "", "creation_timestamp": "2025-07-30T17:40:13.216311Z"}, {"uuid": "e6e73bb8-c3e2-4150-88f5-d88d3eda9ec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "seen", "source": "https://t.me/cyberbannews_ir/11499", "content": "\ud83e\ude99\u0633\u0648\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc \u0642\u062f\u06cc\u0645\u06cc \u062f\u06cc \u0644\u06cc\u0646\u06a9\n\n\ud83d\udcc3 \u0622\u0698\u0627\u0646\u0633 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0648 \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a (CISA) \u0631\u0648\u0632 \u067e\u0646\u062c\u0634\u0646\u0628\u0647\u060c \u062f\u0648 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2024-3273 \u0648 CVE-2024-3272 \u0631\u0627 \u0628\u0647 \u0644\u06cc\u0633\u062a \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627\u06cc \u0634\u0646\u0627\u062e\u062a\u0647 \u0634\u062f\u0647 \u062e\u0648\u062f \u0627\u0636\u0627\u0641\u0647 \u06a9\u0631\u062f \u0648 \u0628\u0647 \u0622\u0698\u0627\u0646\u0633 \u0647\u0627\u06cc \u0641\u062f\u0631\u0627\u0644 \u0647\u0634\u062f\u0627\u0631 \u062f\u0627\u062f \u06a9\u0647 \u062a\u0627 2 \u0645\u06cc \u0641\u0631\u0635\u062a \u062f\u0627\u0631\u0646\u062f \u062a\u0627 \u0633\u062e\u062a \u0627\u0641\u0632\u0627\u0631 \u062f\u06cc \u0644\u06cc\u0646\u06a9 (D-Link) \u0631\u0627 \u06a9\u0647 \u062f\u0631 \u0628\u0631\u062e\u06cc \u0627\u0632 \u0645\u0648\u0627\u0631\u062f\u060c \u0645\u0645\u06a9\u0646 \u0627\u0633\u062a \u06cc\u06a9 \u062f\u0647\u0647 \u0627\u0632 \u0639\u0645\u0631\u0634\u0627\u0646 \u06af\u0630\u0634\u062a\u0647 \u0628\u0627\u0634\u062f \u0631\u0627 \u0628\u0627\u0632\u0646\u0634\u0633\u062a\u0647 \u06cc\u0627 \u062c\u0627\u06cc\u06af\u0632\u06cc\u0646 \u06a9\u0646\u0646\u062f.\n\n\ud83d\udd3a\u062f\u0633\u062a\u06af\u0627\u0647 \u0647\u0627\u06cc \u0645\u062a\u0635\u0644 \u0628\u0647 \u0634\u0628\u06a9\u0647 \u0628\u0631\u0627\u06cc \u0630\u062e\u06cc\u0631\u0647 \u0648 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0641\u0627\u06cc\u0644 \u0647\u0627 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u0634\u0648\u0646\u062f.\n\n\ud83d\udd18 \u06af\u0632\u0627\u0631\u0634 \u06a9\u0627\u0645\u0644 \n\n#\u0627\u0645\u0646\u06cc\u062a_\u0633\u0627\u06cc\u0628\u0631\u06cc #\u0622\u0633\u06cc\u0628_\u067e\u0630\u06cc\u0631\u06cc #\u0627\u0645\u0646\u06cc\u062a #\u062f\u06cc_\u0644\u06cc\u0646\u06a9\n\n\ud83e\udda0 @cyberbannews_ir", "creation_timestamp": "2024-04-14T05:25:20.000000Z"}, {"uuid": "86531938-8747-4662-a634-79062e722518", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "exploited", "source": "Telegram/-h5GVRjjjhPE0kGDVl5o_KYUxLD3LPnUNs8nfIS6CE3oIQA", "content": "", "creation_timestamp": "2024-04-09T08:52:14.000000Z"}, {"uuid": "b8d48f23-33c7-499d-b1b5-6051b1e7188e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6982", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aUNTESTED exploit script for CVE-2024-3272 + CVE-2024-3273. The script exploits a backdoor authentication bypass + arbitrary command injection vulnerability. \nURL\uff1ahttps://github.com/nickswink/D-Link-NAS-Devices-Unauthenticated-RCE\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-08T13:56:56.000000Z"}, {"uuid": "6faafee2-1661-42da-8651-43162c71d2da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-3272", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/2eff5ef2-5bb3-4e53-8064-25de3579bf6e", "content": "", "creation_timestamp": "2026-02-02T12:26:38.300111Z"}, {"uuid": "cb77132a-cd5b-44ad-ae77-29033f7e62cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7359", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPatch your D-Link device affected by CVE-2024-3272 \nURL\uff1ahttps://github.com/aliask/dinkleberry\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-21T08:42:52.000000Z"}, {"uuid": "1c1cd5c0-abe5-4317-8ea1-00e12df6d176", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "exploited", "source": "Telegram/XMKlU8WglbPOYzxhaNs8UJZntuo_NAyljofjDSEqqryHyg", "content": "", "creation_timestamp": "2024-04-13T15:12:50.000000Z"}, {"uuid": "4dae64b7-33b1-4f24-b917-e2473bf38bbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "exploited", "source": "Telegram/wW7U1no5ojC0Y2wcsFjSD5qBtXFRjqmeEaf2A0AZXBBzbQ", "content": "", "creation_timestamp": "2024-04-09T11:25:07.000000Z"}, {"uuid": "30938576-9109-4f47-96c8-c5d70846ef34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/5303", "content": "The Hacker News\nCritical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks\n\nThreat actors are actively scanning and exploiting a pair of security flaws that are said to affect as many as 92,000 internet-exposed D-Link network-attached storage (NAS) devices.\nTracked as&nbsp;CVE-2024-3272&nbsp;(CVSS score: 9.8) and&nbsp;CVE-2024-3273&nbsp;(CVSS score: 7.3), the vulnerabilities impact&nbsp;legacy D-Link products&nbsp;that have reached end-of-life (EoL) status. D-Link, in", "creation_timestamp": "2024-04-09T11:25:08.000000Z"}, {"uuid": "f92162c9-13d7-4f40-81a4-06112256fce1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "exploited", "source": "https://t.me/information_security_channel/51950", "content": "Exploitation of Unpatched D-Link NAS Device Vulnerabilities Soars\nhttps://www.securityweek.com/exploitation-of-unpatched-d-link-nas-device-vulnerabilities-soars/\n\nSecond identifier, CVE-2024-3272, assigned to unpatched D-Link NAS device vulnerabilities, just as exploitation attempts soar.\u00a0\nThe post Exploitation of Unpatched D-Link NAS Device Vulnerabilities Soars (https://www.securityweek.com/exploitation-of-unpatched-d-link-nas-device-vulnerabilities-soars/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-04-12T14:02:20.000000Z"}, {"uuid": "cec669b1-4474-4a4e-9685-3809c59fb8fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/998", "content": "The Hacker News\nCritical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks\n\nThreat actors are actively scanning and exploiting a pair of security flaws that are said to affect as many as 92,000 internet-exposed D-Link network-attached storage (NAS) devices.\nTracked as&nbsp;CVE-2024-3272&nbsp;(CVSS score: 9.8) and&nbsp;CVE-2024-3273&nbsp;(CVSS score: 7.3), the vulnerabilities impact&nbsp;legacy D-Link products&nbsp;that have reached end-of-life (EoL) status. D-Link, in", "creation_timestamp": "2024-04-09T11:25:08.000000Z"}, {"uuid": "9fb4892f-ffe1-40ee-bbc2-65ee3600844b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "exploited", "source": "Telegram/vTArh35mEL3sCATfIt_UjLT5WtBv60krK8jDjJ3n9C3e-Q", "content": "", "creation_timestamp": "2024-04-09T08:56:59.000000Z"}, {"uuid": "01de48dc-a1f7-4fdf-bc6e-a9f9dfb6839e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "exploited", "source": "https://t.me/KomunitiSiber/1750", "content": "Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks\nhttps://thehackernews.com/2024/04/critical-flaws-leave-92000-d-link-nas.html\n\nThreat actors are actively scanning and exploiting a pair of security flaws that are said to affect as many as 92,000 internet-exposed D-Link network-attached storage (NAS) devices.\nTracked as\u00a0CVE-2024-3272\u00a0(CVSS score: 9.8) and\u00a0CVE-2024-3273\u00a0(CVSS score: 7.3), the vulnerabilities impact\u00a0legacy D-Link products\u00a0that have reached end-of-life (EoL) status. D-Link, in", "creation_timestamp": "2024-04-09T08:44:03.000000Z"}, {"uuid": "9e043d67-ba76-4594-a461-e6c82f384bc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3272", "type": "exploited", "source": "https://t.me/thehackernews/4790", "content": "\u26a0\ufe0f Urgent Alert: Hackers are exploiting vulnerabilities (CVE-2024-3272 and CVE-2024-3273) in D-Link NAS devices. \n \nUp to 92,000 devices affected, allowing data theft and device control. \n \nhttps://thehackernews.com/2024/04/critical-flaws-leave-92000-d-link-nas.html \n \nD-Link won't fix it \u2013 upgrade or disconnect ASAP!", "creation_timestamp": "2024-04-09T08:20:54.000000Z"}]}