Skip to main content

CVE-2024-22852: n/a in n/a

Critical
VulnerabilityCVE-2024-22852cvecve-2024-22852
Published: Tue Feb 06 2024 (02/06/2024, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

D-Link Go-RT-AC750 GORTAC750_A1_FW_v101b03 contains a stack-based buffer overflow via the function genacgi_main. This vulnerability allows attackers to enable telnet service via a specially crafted payload.

AI-Powered Analysis

AILast updated: 07/06/2025, 08:13:24 UTC

Technical Analysis

CVE-2024-22852 is a critical stack-based buffer overflow vulnerability identified in the firmware version 101b03 of the D-Link Go-RT-AC750 router (model GORTAC750_A1). The vulnerability exists in the function genacgi_main, which is likely part of the router's web management interface or CGI handling code. Exploitation of this vulnerability allows an unauthenticated remote attacker to send a specially crafted payload that triggers the buffer overflow, enabling them to activate the telnet service on the device. This is significant because telnet is an insecure protocol that provides command-line access to the device without encryption, potentially allowing full control over the router. The CVSS v3.1 base score of 9.8 reflects the high severity, with an attack vector that is network-based (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability falls under CWE-787 (Out-of-bounds Write), indicating that the buffer overflow could overwrite critical memory regions, leading to arbitrary code execution or system compromise. No patches or vendor advisories are currently listed, and there are no known exploits in the wild at the time of publication, but the ease of exploitation and critical impact make this a high-risk vulnerability for affected devices.

Potential Impact

For European organizations, the impact of this vulnerability can be severe, especially for small and medium enterprises (SMEs) and home office environments that commonly use consumer-grade routers like the D-Link Go-RT-AC750. Successful exploitation could lead to full compromise of the router, allowing attackers to intercept, manipulate, or redirect network traffic, deploy malware, or establish persistent backdoors via the enabled telnet service. This could result in data breaches, disruption of business operations, and lateral movement into internal networks. Critical infrastructure or organizations with remote sites relying on these routers may face increased risk of espionage or sabotage. The lack of authentication and user interaction requirements means attackers can exploit this remotely and silently, increasing the threat surface. Additionally, compromised routers could be conscripted into botnets for large-scale attacks, further amplifying the impact on European networks.

Mitigation Recommendations

Given the absence of official patches, European organizations should immediately identify and isolate affected devices. Specific mitigation steps include: 1) Disable remote management interfaces and telnet services on all routers where possible to reduce exposure. 2) Replace vulnerable devices with updated models or firmware versions once available from D-Link or trusted vendors. 3) Implement network segmentation to isolate IoT and consumer-grade devices from critical business systems. 4) Monitor network traffic for unusual telnet connections or unexpected device behavior indicative of compromise. 5) Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting genacgi_main or related CGI vulnerabilities. 6) Educate users and IT staff about the risks of using default or outdated router firmware and the importance of timely updates. 7) Consider deploying network access control (NAC) to restrict unauthorized devices from connecting to sensitive networks. These targeted actions go beyond generic advice by focusing on the specific nature of this vulnerability and the affected device class.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-11T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec36c

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/6/2025, 8:13:24 AM

Last updated: 7/28/2025, 9:12:47 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats