Friend
Professional
- Messages
- 2,653
- Reaction score
- 850
- Points
- 113
The company urges users to update their devices urgently.
D-Link has fixed critical vulnerabilities in three popular wireless router models that could allow remote attackers to execute arbitrary code or gain access to devices using embedded credentials.
Models that are in demand among users interested in high-end Wi-Fi 6 routers (DIR-X) and mesh network systems (COVR) are at risk. The vulnerabilities affected COVR-X1870 software versions up to v1.02 inclusive, DIR-X4860 up to v1.04B04_Hot-Fix, and DIR-X5460 up to v1.11B01_Hot-Fix.
The company published information on five vulnerabilities, three of which were rated as critical:
To resolve these issues, D-Link recommends that users update the firmware: to v1.03B01 for COVR-X1870, v1.04B05 for DIR-X4860, and to DIR-X5460A1_V1.11B04 for DIR-X5460.
According to the company, the problems became known on June 24 thanks to the organization TWCERT (national CERT of Taiwan). However, the manufacturer did not receive the standard 90 days to fix vulnerabilities before they are publicly disclosed.
In a statement, D-Link said, "As soon as the company became aware of the issues, we immediately began investigating and developing fixes. However, a third party disclosed the vulnerabilities before the patches were finalized, which is not in line with our standard 90-day schedule for security updates. We do not recommend that security researchers act in this way, as it exposes users to additional risks before patches are released".
At the moment, there have been no reports of exploitation, but D-Link remains a frequent target for botnets, so installing security updates remains critical.
Source
D-Link has fixed critical vulnerabilities in three popular wireless router models that could allow remote attackers to execute arbitrary code or gain access to devices using embedded credentials.
Models that are in demand among users interested in high-end Wi-Fi 6 routers (DIR-X) and mesh network systems (COVR) are at risk. The vulnerabilities affected COVR-X1870 software versions up to v1.02 inclusive, DIR-X4860 up to v1.04B04_Hot-Fix, and DIR-X5460 up to v1.11B01_Hot-Fix.
The company published information on five vulnerabilities, three of which were rated as critical:
- CVE-2024-45694 (CVSS: 9.8): Stack buffer overflow that allows remote attackers to execute arbitrary code.
- CVE-2024-45695 (CVSS: 9.8): Similar buffer overflow leading to arbitrary code execution.
- CVE-2024-45696 (CVSS: 8.8): Attackers could force the telnet service to be enabled using built-in credentials on the local network.
- CVE-2024-45697 (CVSS: 9.8): telnet service is activated when a WAN port is connected, allowing remote access using built-in credentials.
- CVE-2024-45698 (CVSS: 8.8): Insufficient validation of telnet inputs, allowing attackers to log in and execute OS commands.
To resolve these issues, D-Link recommends that users update the firmware: to v1.03B01 for COVR-X1870, v1.04B05 for DIR-X4860, and to DIR-X5460A1_V1.11B04 for DIR-X5460.
According to the company, the problems became known on June 24 thanks to the organization TWCERT (national CERT of Taiwan). However, the manufacturer did not receive the standard 90 days to fix vulnerabilities before they are publicly disclosed.
In a statement, D-Link said, "As soon as the company became aware of the issues, we immediately began investigating and developing fixes. However, a third party disclosed the vulnerabilities before the patches were finalized, which is not in line with our standard 90-day schedule for security updates. We do not recommend that security researchers act in this way, as it exposes users to additional risks before patches are released".
At the moment, there have been no reports of exploitation, but D-Link remains a frequent target for botnets, so installing security updates remains critical.
Source