Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27662: n/a

0
Medium
VulnerabilityCVE-2024-27662cvecve-2024-27662
Published: Thu Feb 29 2024 (02/29/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

D-Link DIR-823G A1V1.0.2B05 was discovered to contain a Null-pointer dereferences in sub_4110f4(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:13:28 UTC

Technical Analysis

CVE-2024-27662 is a vulnerability identified in the D-Link DIR-823G A1V1.0.2B05 router firmware, characterized by a null-pointer dereference occurring within the sub_4110f4() function. This flaw is triggered when the device processes crafted input, leading to a denial of service (DoS) condition by causing the router software to crash or become unresponsive. The vulnerability is classified under CWE-395 (Use of Null Pointer Dereference), which typically results in application crashes or system instability. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The attack vector is adjacent network (AV:A), meaning the attacker must have access to the local network or a connected network segment. No privileges or user interaction are required, making it easier for attackers with network access to exploit. The vulnerability impacts availability only, with no confidentiality or integrity compromise. No patches or official fixes have been published as of the report date, and no known exploits have been observed in the wild. The affected product is a widely used consumer-grade router, which may be deployed in homes and small offices, potentially exposing many users to service disruption if exploited.

Potential Impact

The primary impact of CVE-2024-27662 is denial of service, which can disrupt network connectivity for users relying on the affected D-Link DIR-823G router. This can lead to loss of internet access, interruption of business operations, and potential cascading effects on dependent systems. For organizations, especially small businesses or home offices using this router model, the DoS can result in operational downtime and productivity loss. While the vulnerability does not expose sensitive data or allow unauthorized control, the availability impact can be significant in environments where network uptime is critical. Attackers with local network access can exploit this vulnerability to cause repeated outages, potentially as part of a larger attack strategy or to disrupt services. The lack of authentication requirement lowers the barrier for exploitation, increasing risk in poorly segmented or unsecured networks.

Mitigation Recommendations

To mitigate CVE-2024-27662, organizations should first restrict network access to the affected router, limiting exposure to trusted networks only. Implement network segmentation to isolate the device from untrusted or public networks, reducing the attack surface. Monitor network traffic for unusual or malformed packets that could indicate exploitation attempts targeting the sub_4110f4() function. Disable any unnecessary services or remote management features on the router to minimize vectors for attack. Since no official patch is currently available, consider replacing the affected device with a more secure model or firmware version if possible. Stay informed about vendor advisories and apply firmware updates promptly once a patch is released. Additionally, maintain regular backups of router configurations to enable quick recovery after a DoS event. Employ intrusion detection systems (IDS) capable of detecting anomalous traffic patterns associated with this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d84b7ef31ef0b583c93

Added to database: 2/25/2026, 9:45:40 PM

Last enriched: 2/28/2026, 10:13:28 AM

Last updated: 4/11/2026, 11:22:20 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses