← Back to BrewedIntel
vulnerabilityhighInformation DisclosurePath TraversalCVE-2024-0769

Jun 27, 2024 • GreyNoise Blog

Perma-Vuln: D-Link DIR-859, CVE-2024-0769

A severe path traversal vulnerability, identified as CVE-2024-0769, has been discovered in the D-Link DIR-859 router. This flaw enables attackers to perform...

Source
GreyNoise Blog
Category
vulnerability
Severity
high

Executive Summary

A severe path traversal vulnerability, identified as CVE-2024-0769, has been discovered in the D-Link DIR-859 router. This flaw enables attackers to perform information disclosure, specifically allowing the extraction of sensitive account details. The severity is compounded by the device's End-of-Life (EoL) status, meaning no official patches will be released to remediate the issue. This creates a permanent security risk for users retaining this hardware. Organizations and individuals are advised to immediately discontinue use of the affected router and replace it with a supported model to mitigate potential unauthorized access. Network segmentation and strict access controls should be implemented if replacement is not immediately feasible. The lack of vendor support necessitates proactive hardware retirement to prevent exploitation of this unpatchable vulnerability within network environments.

Summary

We've uncovered a path traversal vulnerability in the D-Link DIR-859 router that leads to information disclosure. This exploit allows extraction of account details and poses long-term risks since the product is End-of-Life and won't be patched.

Published Analysis

A severe path traversal vulnerability, identified as CVE-2024-0769, has been discovered in the D-Link DIR-859 router. This flaw enables attackers to perform information disclosure, specifically allowing the extraction of sensitive account details. The severity is compounded by the device's End-of-Life (EoL) status, meaning no official patches will be released to remediate the issue. This creates a permanent security risk for users retaining this hardware. Organizations and individuals are advised to immediately discontinue use of the affected router and replace it with a supported model to mitigate potential unauthorized access. Network segmentation and strict access controls should be implemented if replacement is not immediately feasible. The lack of vendor support necessitates proactive hardware retirement to prevent exploitation of this unpatchable vulnerability within network environments. We've uncovered a path traversal vulnerability in the D-Link DIR-859 router that leads to information disclosure. This exploit allows extraction of account details and poses long-term risks since the product is End-of-Life and won't be patched. We've uncovered a path traversal vulnerability in the D-Link DIR-859 router that leads to information disclosure. This exploit allows extraction of account details and poses long-term risks since the product is End-of-Life and won't be patched.

Linked Entities

  • CVE-2024-0769