Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0769: CWE-22 Path Traversal in D-Link DIR-859

0
Medium
VulnerabilityCVE-2024-0769cvecve-2024-0769cwe-22
Published: Sun Jan 21 2024 (01/21/2024, 08:00:05 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-859

Description

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:09:45 UTC

Technical Analysis

CVE-2024-0769 is a path traversal vulnerability classified under CWE-22, impacting the D-Link DIR-859 router firmware version 1.06B01. The vulnerability arises from insufficient validation of the 'service' parameter in HTTP POST requests to the /hedwig.cgi endpoint. By injecting a crafted payload such as '../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml', an attacker can traverse the file system hierarchy and access arbitrary files outside the intended directory scope. This can lead to unauthorized disclosure of configuration files or other sensitive data stored on the device. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 5.3 (medium), reflecting the confidentiality impact without integrity or availability effects. The vendor has confirmed the product is end-of-life and no patches will be issued, advising users to retire or replace the device. No known exploits have been observed in the wild, but public disclosure means attackers could develop exploits. The vulnerability affects only version 1.06B01 of the DIR-859 router, which is a consumer-grade networking device commonly used in home and small office environments.

Potential Impact

The primary impact of CVE-2024-0769 is unauthorized disclosure of sensitive configuration files or other data accessible via path traversal. Attackers could leverage this to gather network configuration details, potentially facilitating further attacks such as network reconnaissance or targeted exploitation of other vulnerabilities. Since the vulnerability does not affect integrity or availability, it does not directly enable device takeover or denial of service. However, disclosure of configuration files could expose credentials or network topology information, increasing the risk of subsequent compromise. Organizations relying on the DIR-859 in sensitive environments may face increased exposure to espionage or targeted attacks. The lack of vendor support and patches means that affected devices remain vulnerable indefinitely, raising long-term security concerns. The exploitability without authentication and remote access capability further elevates the threat, especially in networks where the device is accessible from untrusted networks.

Mitigation Recommendations

Given the device is end-of-life and no patches are available, the primary mitigation is to retire and replace the D-Link DIR-859 router with a supported model that receives security updates. Until replacement, network administrators should restrict access to the router's management interface by implementing strict firewall rules to block HTTP POST requests to /hedwig.cgi from untrusted sources. Network segmentation should be employed to isolate the device from critical assets and limit exposure. Monitoring network traffic for suspicious POST requests targeting the vulnerable endpoint can help detect exploitation attempts. If possible, disable remote management features or restrict management access to trusted IP addresses only. Regularly audit device configurations and logs for signs of unauthorized access. Educate users about the risks of using unsupported hardware and the importance of timely device replacement. Finally, consider deploying network intrusion detection systems (NIDS) with signatures for path traversal attempts targeting this router model.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-20T15:12:52.576Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b0247d717aace268a1

Added to database: 10/21/2025, 7:06:24 PM

Last enriched: 2/28/2026, 11:09:45 AM

Last updated: 3/22/2026, 6:59:41 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses