CVE-2024-0769

D-Link · D-Link DIR-859 Router

A critical path traversal vulnerability, identified as CVE-2024-0769, exists in the D-Link DIR-859 router.

Executive summary

A critical path traversal vulnerability, identified as CVE-2024-0769, exists in the D-Link DIR-859 router. This flaw allows an unauthenticated attacker with network access to read sensitive files on the device, which could expose administrative credentials and lead to a complete system compromise. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed this vulnerability is being actively exploited in the wild, posing an immediate and severe threat to organizations using this hardware.

Vulnerability

This vulnerability is a path traversal (also known as "directory traversal") flaw in the router's web management interface. An unauthenticated remote attacker can exploit this by sending a specially crafted HTTP request containing "dot-dot-slash" (../) sequences to the device. This technique allows the attacker to bypass access controls and navigate outside of the intended web server root directory, enabling them to read arbitrary files from the router's underlying file system. Successful exploitation could grant access to sensitive files such as /etc/passwd, configuration backups, or system logs containing credentials.

Business impact

The business impact of this vulnerability is rated as Critical, with a CVSS score of 9.5. Exploitation can lead to a severe security breach with significant operational consequences. An attacker could retrieve administrative credentials, Wi-Fi passwords, and detailed network configuration, effectively gaining full control over the router. This compromised device could then be used to launch man-in-the-middle attacks to intercept or alter network traffic, serve as a pivot point to attack other internal network assets, or be conscripted into a botnet. The inclusion in the CISA KEV catalog confirms active exploitation, meaning the risk is not theoretical but an immediate and ongoing threat.

Remediation

Immediate Action: All organizations must take immediate action to address this vulnerability. Per CISA's directive for federal agencies, the deadline for remediation is extremely short: FEDERAL DEADLINE: July 15, 2025 (5 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. If a patch from D-Link is available, it must be applied immediately. If no patch or mitigation is available, the device must be disconnected from the network and decommissioned.

Proactive Monitoring: Monitor web server access logs on the router for any requests containing path traversal sequences (e.g., ../, %2e%2e%2f). Network traffic should be analyzed for anomalous outbound connections from the router, which could indicate data exfiltration or command-and-control (C2) communication. Monitor for any unauthorized configuration changes or unexpected system reboots.

Compensating Controls: If patching cannot be performed immediately, implement the following controls to reduce the risk of exploitation:

  • Restrict all access to the router's web management interface to a secure, isolated management network or specific trusted IP addresses.
  • Disable remote/WAN management access to ensure the interface is not exposed to the public internet.
  • If possible, place a Web Application Firewall (WAF) or Intrusion Prevention System (IPS) in front of the device with rules to detect and block path traversal attack patterns.

Exploitation status

Public Exploit Available: True

Analyst recommendation

Given the critical severity (CVSS 9.5) and confirmed active exploitation in the wild, this vulnerability requires immediate and decisive action. We recommend that organizations immediately identify all D-Link DIR-859 routers within their environment using asset inventory systems. The primary course of action must be to apply the vendor-supplied patch or firmware update without delay, treating this as an emergency change. If a patch is not available, the only acceptable alternative is to immediately isolate the devices from the network and begin the process of replacing them. Due to its KEV status, failing to remediate this vulnerability presents an unacceptable risk of network compromise.