<\/a><\/figure>\n\n\n\n“It is unclear at this time what the intended use of this disclosed information is, it should be noted that these devices will never receive a patch. Any information disclosed from the device will remain valuable to attackers for the lifetime of the device as long as it remains internet facing.” concludes GreyNoise. “These attributes make for the potential of a long-tail of exploitation that may come to a head at a later date, such as through a currently unknown authenticated RCE vulnerability in the affected device.”<\/em><\/p>\n\n\n\n
The researchers pointed out that the public PoC exploit targets\u00a0the ‘DHCPS6.BRIDGE-1.xml’ file instead of\u00a0‘DEVICE.ACCOUNT.xml’,\u00a0for this reason, attackers can use it to attack other files.<\/p>\n\n\n\n
The GreyNoise post include a list of possible variations of other getcfg files that can be invoked using CVE-2024-0769.<\/gwmw><\/gwmw><\/gwmw><\/p>\n\n\n\n
D-Link customers are recommended to replace the EoL devices as soon as possible.<\/gwmw><\/gwmw><\/gwmw><\/p>\n\n\n\n