First published: Mon Sep 16 2024(Updated: )
Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inject arbitrary OS commands, which can then be executed on the device.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Dlink Dir-x4860 Firmware | =1.00 | |
Dlink Dir-x4860 Firmware | =1.04 | |
Dlink Dir-x4860 Firmware | =a1 |
Update firmware of DIR-X4860 A1 to version 1.04B05 or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45698 is considered to have a high severity due to the ability for unauthenticated attackers to remotely execute arbitrary OS commands.
To mitigate CVE-2024-45698, update the D-Link DIR-X4860 firmware to the latest version that addresses this vulnerability.
CVE-2024-45698 affects certain models of D-Link DIR-X4860 routers running specific firmware versions 1.00 and 1.04.
Yes, unauthorized users can gain access to the D-Link DIR-X4860 through the telnet service due to hard-coded credentials.
The risk of exploitation of CVE-2024-45698 includes the potential for full control over affected devices and disruption of network services.