CVE-2024-0769
D-Link DIR-859 HTTP POST Request hedwig.cgi path traversal
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
Se encontró una vulnerabilidad en D-Link DIR-859 1.06B01. Ha sido calificada como crítica. Una función desconocida del archivo /hedwig.cgi del componente HTTP POST Request Handler es afectada por esta vulnerabilidad. La manipulación del argumento servicio con la entrada ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml conduce a un path traversal. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse. VDB-251666 es el identificador asignado a esta vulnerabilidad. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante. NOTA: Se contactó primeramente con el proveedor y se confirmó de inmediato que el producto ha llegado al final de su vida útil. Debería retirarse y reemplazarse.
Eine kritische Schwachstelle wurde in D-Link DIR-859 1.06B01 ausgemacht. Es geht hierbei um eine nicht näher spezifizierte Funktion der Datei /hedwig.cgi der Komponente HTTP POST Request Handler. Durch Manipulieren des Arguments service mit der Eingabe ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-01-20 CVE Reserved
- 2024-01-21 CVE Published
- 2024-08-29 CVE Updated
- 2024-08-29 First Exploit
- 2024-10-02 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://vuldb.com/?id.251666 | Technical Description |
URL | Date | SRC |
---|---|---|
https://github.com/c2dc/cve-reported/blob/main/CVE-2024-0769/CVE-2024-0769.md | 2024-08-29 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10371 | 2024-05-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Dlink Search vendor "Dlink" | Dir-859 Firmware Search vendor "Dlink" for product "Dir-859 Firmware" | 1.06 Search vendor "Dlink" for product "Dir-859 Firmware" and version "1.06" | beta1 |
Affected
| in | Dlink Search vendor "Dlink" | Dir-859 Search vendor "Dlink" for product "Dir-859" | - | - |
Safe
|