{"id":168471,"date":"2024-09-16T19:09:42","date_gmt":"2024-09-16T19:09:42","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=168471"},"modified":"2024-09-16T19:09:44","modified_gmt":"2024-09-16T19:09:44","slug":"d-link-rce-wireless-router-models","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/168471\/security\/d-link-rce-wireless-router-models.html","title":{"rendered":"D-Link addressed three critical RCE in wireless router models"},"content":{"rendered":"
<\/div>\n

D-Link fixed multiple critical flaws in its WiFi 6 routers that allow remote attackers to execute arbitrary code or gain hardcoded credentials.<\/h2>\n\n\n\n

D-Link has addressed three critical vulnerabilities, tracked as CVE-2024-45694<\/strong><\/a>, CVE-2024-45695<\/strong><\/a>, CVE-2024-45697<\/strong><\/a><\/gwmw>, impacting three wireless router models. The flaws can allow attackers to remotely execute arbitrary code or access the devices using hardcoded credentials.<\/p>\n\n\n\n

The manufacturer also addressed two high-severity vulnerabilities, tracked as CVE-2024-45696<\/strong><\/a> and CVE-2024-45698<\/strong><\/a>.<\/p>\n\n\n\n

On June 8, 2021, the TWCERT reported the vulnerabilities in D-Link DIR-X5460 to the company.<\/p>\n\n\n\n

“When D-Link became aware of the reported security issues, we promptly started investigating and developing security patches. The third-party publicly disclosed the problem before the patches were available on our standard 90-day security patch release schedule.” reads the advisory<\/strong><\/a>. “We do not recommend that security researchers act in this manner, as they expose end-users to further risks without patches being available from the manufacturer.”<\/p>\n\n\n\n

Below are the descriptions of the issues addressed by D-Link:<\/p>\n\n\n\n

CVE-2024-45694<\/strong><\/a>\u00a0(9.8 critical): The issue is a stack-based buffer overflow in the web service of certain models of D-Link wireless routers. Unauthenticated remote attackers could exploit this vulnerability to execute arbitrary code on the device. The issue impacts:<\/p>\n\n\n\n