Skip to content

D-Link Known Exploited Vulnerabilities - 20240517001

Overview

Recently added to CISA's Known Exploited Vulnerabilities Catalog, there are two D-Link router vulnerabilities that allow access to sensitive information or configurations. Though these are several years old, they have been observed by other organisations to have been exploited recently.

What is the vulnerability?

CVE Severity CVSS Product(s) Affected Summary Dated CISA Published
CVE-2021-40655 High 7.5 D-LINK-DIR-605 B2 versions before Firmware Version : 2.01MT An attacker can obtain a user name and password by forging a post request to the /getcfg.php page 24th Septermber 2021 16th May 2024
CVE-2014-100005 Medium 6.8 D-Link DIR-600 firmware before 2.16WW and lower Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev. Bx) with firmware before 2.17b02 allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator account or (2) enable remote management via a crafted configuration module to hedwig.cgi, (3) activate new configuration settings via a SETCFG,SAVE,ACTIVATE action to pigwidgeon.cgi, or (4) send a ping via a ping action to diagnostic.php. 1st January 2015 16th May 2024

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing, however it is known to have been exploited in other organisations worldwide.

Recommendation

The WA SOC recommends to apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

Additional Reference