CVE-2024-57045 Scanner

CVE-2024-57045 Scanner - Information Disclosure vulnerability in D-Link DIR-859

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

18 days 18 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

D-Link DIR-859 routers are commonly used by both individuals and small businesses to provide wireless networking capabilities. They are known for their high-speed performance and reliability, making them a popular choice for home networking. The routers are designed to offer easy setup and management features, appealing to non-technical users. Their application spans across various environments where secure and stable internet connectivity is required. Users can configure and manage these devices through web interfaces or mobile apps, enhancing user experience. However, the devices are sometimes targeted for vulnerabilities due to their widespread usage.

The Information Disclosure vulnerability in the D-Link DIR-859 allows unauthorized access to sensitive information, notably the device account credentials. This vulnerability can be exploited by sending an unauthenticated request to a specific endpoint. This flaw is categorized under critical security vulnerabilities due to the high risk associated with unauthorized access. Attackers can potentially gain full administrative control over the device by exploiting this issue. Given that many users deploy these routers in private and business environments, the implications of such unauthorized access can be significant. Privacy and data security concerns are particularly critical for all D-Link DIR-859 users.

The technical details involve an endpoint `/getcfg.php` in the device firmware that returns sensitive configuration data. When accessed with specific parameters, it yields information including account names and passwords as part of the response. The vulnerable endpoint, when exploited without authentication, aligns with the type of threat that can lead to administrative access without prior credential compromise. It particularly targets configurations where the D-Link firmware hasn't been properly patched or secured. Because the endpoint responds with sensitive information in XML format, it emphasizes the lack of access control to critical components. The issue arises because the endpoint is not adequately restricted to authenticated users, leading to potential exposure.

Exploiting this vulnerability could lead to severe outcomes such as unauthorized administrative access and control over the affected device. Attackers could alter network configurations, intercept sensitive data, or use the router as a pivot to attack other networked systems. This kind of control can disrupt connected network services, lead to data theft, or cause denial of service by modifying the router’s settings. The overall network integrity and confidentiality would be compromised, potentially affecting personal data, communication privacy, and the overall security posture. The reversibility of unauthorized changes further complicates the potential risks involved.

REFERENCES

Get started to protecting your digital assets