CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-41611

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00055/1

CVE-2024-41611: D-Link DIR-860L routers are vulnerable due to hardcoded Telnet credentials, allowing unauthorized remote access. This flaw in FIRMWARE PATCH 1.10..B04 enables attackers to execute arbitrary commands after remotely logging in. The CVSS score is 0, indicating no impact according to the CVSS scoring system. However, the SOCRadar Vulnerability Risk Score (SVRS) is 30, suggesting a moderate risk, particularly because this vulnerability is tagged "In The Wild." Despite a low SVRS score, users should change the telnet password immediately as attackers can fully compromise affected devices. This significantly impacts the security of networks using the flawed D-Link DIR-860L routers. Therefore, administrators must apply updates to mitigate risks associated with compromised devices.

In The Wild
2024-07-30

2024-08-01
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-41611 is a critical vulnerability in D-Link DIR-860L REVA FIRMWARE PATCH 1.10..B04 that allows remote attackers to log in to the Telnet service and execute arbitrary commands due to hardcoded credentials. The CVSS score of 9.8 indicates the severity of this vulnerability, while the SVRS of 46 highlights the urgency of addressing it.

Key Insights:

  • Remote Access: The vulnerability allows attackers to gain remote access to the affected device, potentially compromising sensitive data and disrupting operations.
  • Arbitrary Command Execution: Attackers can execute arbitrary commands on the device, giving them complete control over its functionality.
  • In the Wild: The vulnerability is actively exploited by hackers, making it a high-priority threat.

Mitigation Strategies:

  • Update Firmware: Install the latest firmware update from D-Link to patch the vulnerability.
  • Disable Telnet: If possible, disable the Telnet service on the device to prevent attackers from exploiting the vulnerability.
  • Use Strong Passwords: Change the default password for the Telnet service to a strong and unique one.
  • Monitor Network Traffic: Implement network monitoring tools to detect and block suspicious activity related to the vulnerability.

Additional Information:

  • Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
  • Exploit Status: Active exploits have been published.
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability, calling for immediate and necessary measures.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-41611 | D-Link DIR-860L 1.10 Telnet Service hard-coded credentials
vuldb.com2024-07-30
CVE-2024-41611 | D-Link DIR-860L 1.10 Telnet Service hard-coded credentials | A vulnerability, which was classified as critical, has been found in D-Link DIR-860L 1.10. This issue affects some unknown processing of the component Telnet Service. The manipulation leads to hard-coded credentials. The identification of this vulnerability is CVE-2024-41611. The attack may be initiated remotely. There is
cve-2024-41611
domains
urls
cves

Social Media

CVE-2024-41611 (CVSS:9.8, CRITICAL) is Awaiting Analysis. In D-Link DIR-860L REVA FIRMWARE PATCH 1.10..B04, the Telnet service contains hardcoded credentials, enabling attackers ..https://t.co/KHGfELfPgD #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://github.com/Nop3z/CVE/blob/main/dlink/dir-820/Dlink-860L-hardcoded-vulnerability.md
[email protected]https://www.dlink.com/en/security-bulletin/
GITHUBhttps://www.dlink.com/en/security-bulletin/

CWE Details

CWE IDCWE NameDescription
CWE-798Use of Hard-coded CredentialsThe software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence