CVE-2024-0769: CWE-22 Path Traversal in D-Link DIR-859
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
AI Analysis
Technical Summary
CVE-2024-0769 is a path traversal vulnerability classified under CWE-22, impacting the D-Link DIR-859 router firmware version 1.06B01. The vulnerability arises from insufficient validation of the 'service' parameter in HTTP POST requests to the /hedwig.cgi endpoint. By injecting a crafted payload such as '../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml', an attacker can traverse the file system hierarchy and access arbitrary files outside the intended directory scope. This can lead to unauthorized disclosure of configuration files or other sensitive data stored on the device. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 5.3 (medium), reflecting the confidentiality impact without integrity or availability effects. The vendor has confirmed the product is end-of-life and no patches will be issued, advising users to retire or replace the device. No known exploits have been observed in the wild, but public disclosure means attackers could develop exploits. The vulnerability affects only version 1.06B01 of the DIR-859 router, which is a consumer-grade networking device commonly used in home and small office environments.
Potential Impact
The primary impact of CVE-2024-0769 is unauthorized disclosure of sensitive configuration files or other data accessible via path traversal. Attackers could leverage this to gather network configuration details, potentially facilitating further attacks such as network reconnaissance or targeted exploitation of other vulnerabilities. Since the vulnerability does not affect integrity or availability, it does not directly enable device takeover or denial of service. However, disclosure of configuration files could expose credentials or network topology information, increasing the risk of subsequent compromise. Organizations relying on the DIR-859 in sensitive environments may face increased exposure to espionage or targeted attacks. The lack of vendor support and patches means that affected devices remain vulnerable indefinitely, raising long-term security concerns. The exploitability without authentication and remote access capability further elevates the threat, especially in networks where the device is accessible from untrusted networks.
Mitigation Recommendations
Given the device is end-of-life and no patches are available, the primary mitigation is to retire and replace the D-Link DIR-859 router with a supported model that receives security updates. Until replacement, network administrators should restrict access to the router's management interface by implementing strict firewall rules to block HTTP POST requests to /hedwig.cgi from untrusted sources. Network segmentation should be employed to isolate the device from critical assets and limit exposure. Monitoring network traffic for suspicious POST requests targeting the vulnerable endpoint can help detect exploitation attempts. If possible, disable remote management features or restrict management access to trusted IP addresses only. Regularly audit device configurations and logs for signs of unauthorized access. Educate users about the risks of using unsupported hardware and the importance of timely device replacement. Finally, consider deploying network intrusion detection systems (NIDS) with signatures for path traversal attempts targeting this router model.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Japan, South Korea, Brazil, India
CVE-2024-0769: CWE-22 Path Traversal in D-Link DIR-859
Description
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-0769 is a path traversal vulnerability classified under CWE-22, impacting the D-Link DIR-859 router firmware version 1.06B01. The vulnerability arises from insufficient validation of the 'service' parameter in HTTP POST requests to the /hedwig.cgi endpoint. By injecting a crafted payload such as '../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml', an attacker can traverse the file system hierarchy and access arbitrary files outside the intended directory scope. This can lead to unauthorized disclosure of configuration files or other sensitive data stored on the device. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 5.3 (medium), reflecting the confidentiality impact without integrity or availability effects. The vendor has confirmed the product is end-of-life and no patches will be issued, advising users to retire or replace the device. No known exploits have been observed in the wild, but public disclosure means attackers could develop exploits. The vulnerability affects only version 1.06B01 of the DIR-859 router, which is a consumer-grade networking device commonly used in home and small office environments.
Potential Impact
The primary impact of CVE-2024-0769 is unauthorized disclosure of sensitive configuration files or other data accessible via path traversal. Attackers could leverage this to gather network configuration details, potentially facilitating further attacks such as network reconnaissance or targeted exploitation of other vulnerabilities. Since the vulnerability does not affect integrity or availability, it does not directly enable device takeover or denial of service. However, disclosure of configuration files could expose credentials or network topology information, increasing the risk of subsequent compromise. Organizations relying on the DIR-859 in sensitive environments may face increased exposure to espionage or targeted attacks. The lack of vendor support and patches means that affected devices remain vulnerable indefinitely, raising long-term security concerns. The exploitability without authentication and remote access capability further elevates the threat, especially in networks where the device is accessible from untrusted networks.
Mitigation Recommendations
Given the device is end-of-life and no patches are available, the primary mitigation is to retire and replace the D-Link DIR-859 router with a supported model that receives security updates. Until replacement, network administrators should restrict access to the router's management interface by implementing strict firewall rules to block HTTP POST requests to /hedwig.cgi from untrusted sources. Network segmentation should be employed to isolate the device from critical assets and limit exposure. Monitoring network traffic for suspicious POST requests targeting the vulnerable endpoint can help detect exploitation attempts. If possible, disable remote management features or restrict management access to trusted IP addresses only. Regularly audit device configurations and logs for signs of unauthorized access. Educate users about the risks of using unsupported hardware and the importance of timely device replacement. Finally, consider deploying network intrusion detection systems (NIDS) with signatures for path traversal attempts targeting this router model.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-20T15:12:52.576Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7d9b0247d717aace268a1
Added to database: 10/21/2025, 7:06:24 PM
Last enriched: 2/28/2026, 11:09:45 AM
Last updated: 3/22/2026, 6:59:41 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.