First published: Sun Jan 21 2024(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
D-Link DIR-859 | =1.06-beta1 | |
D-Link DIR-859 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0769 has been rated as a critical vulnerability.
CVE-2024-0769 affects the HTTP POST Request Handler in D-Link DIR-859 firmware version 1.06-beta1.
To mitigate CVE-2024-0769, users should consider upgrading to a newer, secure version of the firmware if available.
CVE-2024-0769 specifically affects the D-Link DIR-859 router firmware version 1.06-beta1.
CVE-2024-0769 involves the manipulation of the 'service' argument in the /hedwig.cgi file.