Category: IT|Sep 3, 2024 | Author: Admin

D-Link says it is not fixing four RCE flaws in DIR-846W routers

Share on

D-Link is warning that four remote code execution (RCE) flaws impacting all hardware and firmware versions of its DIR-846W router will not be fixed as the products are no longer supported.

D-Link says it is not fixing four RCE flaws in DIR-846W routers

D-Link is warning that four remote code execution (RCE) flaws impacting all hardware and firmware versions of its DIR-846W router will not be fixed as the products are no longer supported.

 

The four RCE flaws, three of which are rated critical and do not require authentication, were discovered by security researcher yali-1002, who released minimal details in their GitHub repository.

 

The researcher published the information on August 27, 2024, but has withheld the publication of proof-of-concept (PoC) exploits for now.

 

The flaws are summarized as follows:

 

CVE-2024-41622: Remote Command Execution (RCE) vulnerability via the tomography_ping_address parameter in the /HNAP1/ interface. (CVSS v3 score: 9.8 "critical")

 

CVE-2024-44340: RCE vulnerability via the smartqos_express_devices and smartqos_normal_devices parameters in SetSmartQoSSettings (authenticated access requirement reduces the CVSS v3 score to 8.8 "high").

 

CVE-2024-44341: RCE vulnerability via the plan(0)_dhcps_staticlist parameter, exploitable through a crafted POST request. (CVSS v3 score: 9.8 "critical")

 

CVE-2024-44342: RCE vulnerability via the wl(0).(0)_ssid parameter. (CVSS v3 score: 9.8 "critical")

 

Though D-Link acknowledged the security problems and their severity, it noted that they fall under its standard end-of-life/end-of-support policies, meaning there will be no security updates to address them.

 

"As a general policy, when products reach EOS/EOL, they can no longer be supported, and all firmware development for these products cease," reads D-Link's announcement.

 

"D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it," adds the vendor further down in the bulletin.

 

It is noted that DIR-846W routers were sold primarily outside the U.S., so the impact of the flaws should be minimal in the States, yet still significant globally. The model is still sold in some markets, including Latin America.

 

Though DIR-846 reached the end of support in 2020, over four years ago, many people only replace their routers once they face hardware problems or practical limitations, so a lot of people could still use the devices.

 

D-Link recommends that people still using the DIR-846 retire it immediately and replace it with a currently supported model.

 

If that is impossible, the hardware vendor recommends that users ensure the device runs the latest firmware, use strong passwords for the web admin portal, and enable WiFi encryption.

 

D-Link vulnerabilities are commonly exploited by malware botnets, such as Mirai and Moobot, to recruit devices into DDoS swarms. Threat actors have also recently exploited a D-Link DIR-859 router flaw to steal passwords and breach devices.

 

Therefore, securing the routers before proof-of-concept exploits are released and abused in attacks is vital.

Sponsored Ads:

Comments:


Chrome_flare-21-05-25.png

Data-stealing Chrome extensions impersonate Fortinet, YouTube, VPNs

Category: Google|May 21, 2025 | Author: Admin
ChatGPT_headpic-20-05-25.png

OpenAI plans to combine multiple models into GPT-5

Category: IT|May 20, 2025 | Author: Admin
Cell-towers-19-05-25.png

O2 UK patches bug leaking mobile user location from call metadata

Category: IT|May 19, 2025 | Author: Admin
Windows_BitLocker-18-05-25.png

Microsoft confirms May Windows 10 updates trigger BitLocker recovery

Category: Microsoft|May 18, 2025 | Author: Admin
karljohan-17-05-25.jpg

Gratulerer med 17. mai!

Category: Norge|May 17, 2025 | Author: Admin
ChatGPT-16-05-25.png

ChatGPT rolls out Codex, an AI tool for software programming

Category: IT|May 16, 2025 | Author: Admin
Google-Chrome-headpic-15-05-25.png

Google Chrome to block admin-level browser launches for better security

Category: Google|May 15, 2025 | Author: Admin
Linux-14-05-25.png

Microsoft fixes Linux boot issues on dual-boot Windows systems

Category: Microsoft|May 14, 2025 | Author: Admin
Windows_11-13-05-25.png

Windows 11 upgrade block lifted after Safe Exam Browser fix

Category: Microsoft|May 13, 2025 | Author: Admin
bluetooth-12-05-25.png

Bluetooth 6.1 enhances privacy with randomized RPA timing

Category: IT|May 12, 2025 | Author: Admin
ChatGPT-22-05-25.png

ChatGPT is finally adding Download as PDF for Deep Research

Category: IT|May 11, 2025 | Author: Admin
Microsoft-Teams-10-05-25.png

Microsoft Teams will soon block screen capture during meetings

Category: Microsoft|May 10, 2025 | Author: Admin
cryptocurrency-header-09-05-25.png

Germany takes down eXch cryptocurrency exchange, seizes servers

Category: IT|May 9, 2025 | Author: Admin
Discord-08-05-25.png

Malicious PyPi package hides RAT malware, targets Discord devs since 2022

Category: IT|May 8, 2025 | Author: Admin
WordPress-headpic-07-05-25.png

Hackers exploit OttoKit WordPress plugin flaw to add admin accounts

Category: IT|May 7, 2025 | Author: Admin
more