CVE-2024-44341
Dlink
CVE-2024-44341 is a critical remote command execution (RCE) vulnerability found in D-Link DIR-846W routers. Specifically, the flaw resides in the firmware version A1 FW100A43 and can be triggered through a specially crafted POST request targeting the lan(0)_dhcps_staticlist parameter.
SOCRadar's Vulnerability Risk Score (SVRS) for CVE-2024-44341 is 95, indicating a very high level of risk. This score, which is significantly influenced by real-world threat intelligence, means immediate action is required to mitigate the threat. The vulnerability allows attackers to execute arbitrary commands on the affected router, potentially leading to full system compromise. Successful exploitation could enable attackers to eavesdrop on network traffic, steal sensitive data, or use the router as a launchpad for further attacks within the network. Given that it is tagged "In The Wild", this vulnerability is actively being exploited. The high CVSS score of 9.8 further emphasizes the severity of this security vulnerability.
Description
CVE-2024-44341 is a critical remote command execution (RCE) vulnerability in D-Link DIR-846W A1 FW100A43. It allows attackers to execute arbitrary commands on the affected device by sending a crafted POST request. The vulnerability has a CVSS score of 9.8 and an SVRS of 86, indicating a high level of severity and urgency.
Key Insights
- Active Exploitation: Active exploits have been published for this vulnerability, indicating that it is being actively exploited by hackers.
- CISA Warning: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of this vulnerability, calling for immediate and necessary measures.
- Threat Actors: Specific threat actors or APT groups have not been identified as actively exploiting this vulnerability.
- Impact: Successful exploitation of this vulnerability could allow attackers to gain complete control of the affected device, including the ability to execute arbitrary commands, steal sensitive data, and launch further attacks.
Mitigation Strategies
- Apply Software Updates: Install the latest firmware update from D-Link to patch the vulnerability.
- Disable Remote Access: If possible, disable remote access to the affected device until the patch is applied.
- Use Strong Passwords: Use strong and unique passwords for the device's administrative account.
- Monitor Network Traffic: Monitor network traffic for suspicious activity and block any unauthorized access attempts.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.