Dns-340L Firmware

by Dlink

Standard maintenance is sufficient

Dns-340L Firmware has low exploitation rates. Attackers rarely target this software's known vulnerabilities.

What to do
  1. Keep automatic updates enabled
  2. No urgent action needed
  3. Review periodically as part of normal maintenance

What Attackers Target

Vulnerabilities with high exploit probability 15.6%
Confirmed actively exploited (CISA) 4.4%
Public exploit code available 0.0%
Based on 45 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.

Most Dangerous Vulnerabilities

CVE CVSS Exploit Probability Confirmed
CVE-2024-3273 7.3 94.4% Yes
CVE-2024-10915 8.1 94.2%
CVE-2024-3272 9.8 94.1% Yes
CVE-2024-10914 8.1 93.9%
CVE-2024-7828 8.8 31.1%
CVE-2024-8132 6.3 23.6%
CVE-2024-8129 6.3 16.8%
CVE-2024-8131 6.3 4.4%
CVE-2024-8212 6.3 3.5%
CVE-2024-8210 6.3 3.5%
CVE-2024-8211 6.3 3.2%
CVE-2024-8128 6.3 3.1%
CVE-2024-8127 6.3 2.4%
CVE-2024-10916 5.3 2.2%
CVE-2024-7830 8.8 1.8%
CVE-2024-7829 8.8 1.8%
CVE-2024-7831 8.8 1.6%
CVE-2024-8213 6.3 1.6%
CVE-2024-8130 6.3 1.6%
CVE-2024-8133 6.3 1.6%
18
/ 100
low-risk
Active Threat 16/50 · Low
Exploit Availability 2/50 · Minimal

Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.