Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33110: n/a

0
Critical
VulnerabilityCVE-2024-33110cvecve-2024-33110
Published: Mon May 06 2024 (05/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-33110 is a critical permission bypass vulnerability affecting D-Link DIR-845L routers running firmware version 1. 01KRb03 and earlier. The flaw exists in the getcfg. php component, allowing unauthenticated remote attackers to bypass access controls and potentially access sensitive configuration data. The vulnerability has a CVSS 3. 1 base score of 9. 1, indicating high impact on confidentiality and integrity without requiring authentication or user interaction. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical nature of the affected device make this a significant risk. Organizations using these routers should prioritize mitigation to prevent unauthorized access and potential compromise of network configurations. This threat primarily affects regions where D-Link routers have strong market penetration, including parts of Asia, Europe, and Latin America.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:22:01 UTC

Technical Analysis

CVE-2024-33110 is a critical security vulnerability identified in the D-Link DIR-845L router, specifically firmware version 1.01KRb03 and earlier. The vulnerability arises from a permission bypass flaw in the getcfg.php component, which is responsible for handling configuration data. This flaw allows remote attackers to bypass authentication mechanisms and access sensitive router configuration information without any credentials. The vulnerability is classified under CWE-287 (Improper Authentication), indicating that the router fails to properly verify user permissions before granting access to critical resources. The CVSS 3.1 score of 9.1 reflects the vulnerability's high severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and impacting confidentiality and integrity (C:H/I:H) but not availability (A:N). Although no public exploits have been reported yet, the vulnerability's characteristics make it highly exploitable by attackers to gain unauthorized access to router settings, potentially leading to further network compromise or data leakage. The lack of an official patch at the time of disclosure increases the urgency for affected users to implement interim protective measures. Given the widespread use of D-Link routers in residential and small business environments, this vulnerability poses a significant risk to a broad user base.

Potential Impact

The impact of CVE-2024-33110 is substantial, as it allows unauthenticated remote attackers to bypass permission controls and access sensitive configuration data on affected D-Link DIR-845L routers. This can lead to exposure of network credentials, administrative settings, and potentially enable attackers to modify router configurations, redirect traffic, or deploy further attacks within the network. The compromise of router integrity can facilitate man-in-the-middle attacks, data interception, or persistent network access. Since the vulnerability does not require authentication or user interaction, it can be exploited at scale by automated scanning and exploitation tools, increasing the risk of widespread attacks. Organizations relying on these routers for network connectivity, especially in small office or home office environments, may face significant confidentiality and integrity breaches, potentially impacting business operations and user privacy.

Mitigation Recommendations

To mitigate CVE-2024-33110, organizations and users should immediately isolate affected D-Link DIR-845L routers from untrusted networks to reduce exposure. Network administrators should monitor for unusual access attempts to the getcfg.php endpoint and implement network-level access controls or firewall rules to restrict external access to router management interfaces. Since no official patches are currently available, users should check regularly for firmware updates from D-Link and apply them promptly once released. As a temporary measure, consider disabling remote management features if enabled, and change default credentials to strong, unique passwords to limit attack surface. Employ network segmentation to separate critical systems from vulnerable devices and use intrusion detection systems to alert on suspicious activities targeting router configuration endpoints. Additionally, organizations should plan for device replacement if firmware updates are not forthcoming or if the device is no longer supported.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c39b7ef31ef0b5614b6

Added to database: 2/25/2026, 9:40:09 PM

Last enriched: 2/26/2026, 4:22:01 AM

Last updated: 2/26/2026, 7:59:38 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats