CVE-2024-25331: n/a
DIR-822 Rev. B Firmware v2.02KRB09 and DIR-822-CA Rev. B Firmware v2.03WWb01 suffer from a LAN-Side Unauthenticated Remote Code Execution (RCE) vulnerability elevated from HNAP Stack-Based Buffer Overflow.
AI Analysis
Technical Summary
CVE-2024-25331 is a critical vulnerability identified in the firmware of D-Link DIR-822 Rev. B (v2.02KRB09) and DIR-822-CA Rev. B (v2.03WWb01) routers. The root cause is a stack-based buffer overflow (CWE-121) in the HNAP service, a protocol used for device management and configuration. This overflow can be triggered by an unauthenticated attacker with access to the local area network, enabling remote code execution (RCE) with the privileges of the affected service. The vulnerability does not require any authentication or user interaction, significantly lowering the barrier to exploitation. The CVSS v3.1 base score of 9.3 reflects the critical impact on confidentiality, integrity, and availability, as successful exploitation could allow an attacker to fully compromise the device, intercept or manipulate network traffic, and potentially pivot to other internal systems. Although no public exploits have been reported yet, the vulnerability's nature and severity make it a prime target for attackers. The affected firmware versions are specific, and no patches or updates have been linked yet, indicating that mitigation relies on network controls or vendor updates when available. The vulnerability was reserved in early February 2024 and published in March 2024, indicating recent discovery and disclosure.
Potential Impact
The impact of CVE-2024-25331 is substantial for organizations and individuals using the affected D-Link routers. Successful exploitation allows attackers to execute arbitrary code remotely on the device without authentication, potentially leading to full device compromise. This can result in interception and manipulation of network traffic, disruption of network availability, and unauthorized access to internal resources. For enterprises, this could mean lateral movement within corporate networks, data exfiltration, or deployment of malware. For home users and small businesses, it could lead to loss of privacy, network outages, or use of the device as a foothold for broader attacks. The vulnerability's LAN-side requirement limits exposure to attackers with local network access, but in many environments, this includes Wi-Fi attackers or compromised internal hosts. Given the critical severity and the widespread use of these router models in various regions, the threat poses a significant risk to network security and operational continuity.
Mitigation Recommendations
1. Immediately segment networks to isolate affected routers from untrusted or guest devices to reduce exposure to potential attackers on the LAN. 2. Disable HNAP services on the affected routers if the option is available in the device settings or via command line to remove the attack vector. 3. Monitor network traffic for unusual or malformed HNAP requests that could indicate exploitation attempts. 4. Restrict physical and wireless access to the local network to trusted users only, minimizing the risk of unauthorized LAN access. 5. Regularly check for firmware updates from D-Link addressing this vulnerability and apply patches promptly once available. 6. Consider replacing affected devices with models that have received security updates or have a better security track record if patches are delayed. 7. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures targeting HNAP buffer overflow attempts. 8. Educate users about the risks of connecting unknown devices to the network and the importance of network hygiene.
Affected Countries
United States, Canada, Germany, United Kingdom, France, Australia, India, Brazil, Mexico, South Africa
CVE-2024-25331: n/a
Description
DIR-822 Rev. B Firmware v2.02KRB09 and DIR-822-CA Rev. B Firmware v2.03WWb01 suffer from a LAN-Side Unauthenticated Remote Code Execution (RCE) vulnerability elevated from HNAP Stack-Based Buffer Overflow.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-25331 is a critical vulnerability identified in the firmware of D-Link DIR-822 Rev. B (v2.02KRB09) and DIR-822-CA Rev. B (v2.03WWb01) routers. The root cause is a stack-based buffer overflow (CWE-121) in the HNAP service, a protocol used for device management and configuration. This overflow can be triggered by an unauthenticated attacker with access to the local area network, enabling remote code execution (RCE) with the privileges of the affected service. The vulnerability does not require any authentication or user interaction, significantly lowering the barrier to exploitation. The CVSS v3.1 base score of 9.3 reflects the critical impact on confidentiality, integrity, and availability, as successful exploitation could allow an attacker to fully compromise the device, intercept or manipulate network traffic, and potentially pivot to other internal systems. Although no public exploits have been reported yet, the vulnerability's nature and severity make it a prime target for attackers. The affected firmware versions are specific, and no patches or updates have been linked yet, indicating that mitigation relies on network controls or vendor updates when available. The vulnerability was reserved in early February 2024 and published in March 2024, indicating recent discovery and disclosure.
Potential Impact
The impact of CVE-2024-25331 is substantial for organizations and individuals using the affected D-Link routers. Successful exploitation allows attackers to execute arbitrary code remotely on the device without authentication, potentially leading to full device compromise. This can result in interception and manipulation of network traffic, disruption of network availability, and unauthorized access to internal resources. For enterprises, this could mean lateral movement within corporate networks, data exfiltration, or deployment of malware. For home users and small businesses, it could lead to loss of privacy, network outages, or use of the device as a foothold for broader attacks. The vulnerability's LAN-side requirement limits exposure to attackers with local network access, but in many environments, this includes Wi-Fi attackers or compromised internal hosts. Given the critical severity and the widespread use of these router models in various regions, the threat poses a significant risk to network security and operational continuity.
Mitigation Recommendations
1. Immediately segment networks to isolate affected routers from untrusted or guest devices to reduce exposure to potential attackers on the LAN. 2. Disable HNAP services on the affected routers if the option is available in the device settings or via command line to remove the attack vector. 3. Monitor network traffic for unusual or malformed HNAP requests that could indicate exploitation attempts. 4. Restrict physical and wireless access to the local network to trusted users only, minimizing the risk of unauthorized LAN access. 5. Regularly check for firmware updates from D-Link addressing this vulnerability and apply patches promptly once available. 6. Consider replacing affected devices with models that have received security updates or have a better security track record if patches are delayed. 7. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures targeting HNAP buffer overflow attempts. 8. Educate users about the risks of connecting unknown devices to the network and the importance of network hygiene.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-02-07T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d65b7ef31ef0b571ca2
Added to database: 2/25/2026, 9:45:09 PM
Last enriched: 2/28/2026, 9:42:53 AM
Last updated: 4/12/2026, 12:44:16 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.