CVE-2024-41611
CVE-2024-41611: D-Link DIR-860L routers are vulnerable due to hardcoded Telnet credentials, allowing unauthorized remote access. This flaw in FIRMWARE PATCH 1.10..B04 enables attackers to execute arbitrary commands after remotely logging in. The CVSS score is 0, indicating no impact according to the CVSS scoring system. However, the SOCRadar Vulnerability Risk Score (SVRS) is 30, suggesting a moderate risk, particularly because this vulnerability is tagged "In The Wild." Despite a low SVRS score, users should change the telnet password immediately as attackers can fully compromise affected devices. This significantly impacts the security of networks using the flawed D-Link DIR-860L routers. Therefore, administrators must apply updates to mitigate risks associated with compromised devices.
Description:
CVE-2024-41611 is a critical vulnerability in D-Link DIR-860L REVA FIRMWARE PATCH 1.10..B04 that allows remote attackers to log in to the Telnet service and execute arbitrary commands due to hardcoded credentials. The CVSS score of 9.8 indicates the severity of this vulnerability, while the SVRS of 46 highlights the urgency of addressing it.
Key Insights:
- Remote Access: The vulnerability allows attackers to gain remote access to the affected device, potentially compromising sensitive data and disrupting operations.
- Arbitrary Command Execution: Attackers can execute arbitrary commands on the device, giving them complete control over its functionality.
- In the Wild: The vulnerability is actively exploited by hackers, making it a high-priority threat.
Mitigation Strategies:
- Update Firmware: Install the latest firmware update from D-Link to patch the vulnerability.
- Disable Telnet: If possible, disable the Telnet service on the device to prevent attackers from exploiting the vulnerability.
- Use Strong Passwords: Change the default password for the Telnet service to a strong and unique one.
- Monitor Network Traffic: Implement network monitoring tools to detect and block suspicious activity related to the vulnerability.
Additional Information:
- Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
- Exploit Status: Active exploits have been published.
- CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability, calling for immediate and necessary measures.
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.