CVE-2024-33112
CVE-2024-33112: Command Injection Vulnerability in D-Link DIR-845L routers. This critical flaw allows unauthorized attackers to execute arbitrary commands on affected devices via the hnap_main() function. Routers running firmware version v1.01KRb03 and earlier are vulnerable to this command injection. While the CVSS score is 7.5, the SOCRadar Vulnerability Risk Score (SVRS) is 68, indicating a moderate risk; however, given the "In The Wild" tag, active exploitation is possible, requiring prompt evaluation and patching. Successful exploitation could lead to complete compromise of the device, data theft, or its use in botnet attacks. This vulnerability poses a significant threat to home and small business networks relying on the D-Link DIR-845L router.
Description
CVE-2024-33112 affects D-Link DIR-845L routers running firmware versions 1.01KRb03 and earlier. The vulnerability allows attackers to execute arbitrary commands through a command injection flaw in the hnap_main()
function, potentially leading to full control over the affected router.
SVRS: While the CVSS score is 7.5, the SOCRadar Vulnerability Risk Score (SVRS) is significantly lower at 34, indicating that while the vulnerability is exploitable, it may not be considered a high-priority threat at this time.
Key Insights
- Command Injection: This vulnerability allows attackers to inject malicious commands into the router's system, potentially leading to complete compromise.
- In the Wild: The vulnerability has been observed being actively exploited by hackers.
- Firmware Versions: Only D-Link DIR-845L routers running firmware versions 1.01KRb03 and earlier are affected.
- Potential Impact: Attackers could gain full control over the affected router, potentially using it to launch further attacks against other devices on the network.
Mitigation Strategies
- Firmware Update: Immediately update the firmware on all affected D-Link DIR-845L routers to the latest available version.
- Network Segmentation: Implement network segmentation to isolate the affected router and limit the impact of a potential compromise.
- Strong Passwords: Use strong and unique passwords for all router administration interfaces.
- Security Monitoring: Implement security monitoring tools to detect and respond to any suspicious activity on the network.
Additional Information
This vulnerability is actively exploited by attackers, making it a serious threat to the security of affected devices. If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.