Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33112: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

0
High
VulnerabilityCVE-2024-33112cvecve-2024-33112cwe-78
Published: Mon May 06 2024 (05/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-33112 is a high-severity OS command injection vulnerability affecting D-Link DIR-845L routers version 1. 01KRb03 and earlier. The flaw exists in the hnap_main() function, allowing unauthenticated remote attackers to execute arbitrary OS commands. Exploitation requires no user interaction and can result in denial of service by impacting router availability. No known exploits are currently reported in the wild. This vulnerability stems from improper neutralization of special elements in OS commands (CWE-78). Organizations using affected D-Link routers should prioritize patching or mitigating this issue to prevent potential service disruptions. The vulnerability has a CVSS 3. 1 base score of 7. 5, reflecting its ease of exploitation and impact on availability.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:22:12 UTC

Technical Analysis

CVE-2024-33112 is an OS command injection vulnerability identified in the D-Link DIR-845L router firmware version 1.01KRb03 and earlier. The vulnerability resides in the hnap_main() function, which is part of the Home Network Administration Protocol (HNAP) implementation used for router management. Due to improper neutralization of special elements in OS commands (classified under CWE-78 and CWE-77), an unauthenticated remote attacker can inject arbitrary operating system commands. This injection flaw allows the attacker to execute commands on the underlying router OS with the privileges of the affected service, potentially leading to denial of service or other impacts on router functionality. The vulnerability does not require any user interaction or prior authentication, making it highly exploitable over the network. The CVSS 3.1 base score of 7.5 reflects a network attack vector with low complexity, no privileges required, no user interaction, and an impact limited to availability (no confidentiality or integrity impact reported). Although no exploits have been observed in the wild yet, the ease of exploitation and the critical role of routers in network infrastructure make this a significant threat. The lack of available patches at the time of publication increases the urgency for mitigation. The vulnerability affects a widely deployed consumer router model, which is popular in various regions globally, especially in Asia and parts of Europe and the Americas.

Potential Impact

The primary impact of CVE-2024-33112 is on the availability of the affected routers. Successful exploitation can lead to denial of service conditions, disrupting internet connectivity and network services for individuals and organizations relying on these devices. Since the vulnerability allows unauthenticated remote command execution, attackers can leverage it to disrupt home or small office networks without needing credentials. This could be exploited in targeted attacks or as part of larger botnet campaigns to cause widespread outages. The compromise of routers can also serve as a foothold for further attacks within a network, such as traffic interception or lateral movement, although no direct confidentiality or integrity impacts are reported. Organizations relying on these routers for critical connectivity may face operational disruptions, impacting productivity and potentially causing financial losses. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially given the public disclosure and availability of technical details.

Mitigation Recommendations

1. Immediately check for firmware updates from D-Link and apply any patches addressing this vulnerability once available. 2. If patches are not yet available, disable remote management interfaces, especially those exposing HNAP services, to reduce attack surface. 3. Segment the network to isolate vulnerable routers from critical systems and sensitive data. 4. Monitor network traffic for unusual or suspicious requests targeting the hnap_main() function or related management endpoints. 5. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect command injection attempts. 6. Consider replacing affected routers with models that have received security updates or have a better security track record. 7. Educate users about the risks of exposing router management interfaces to the internet and encourage strong network perimeter defenses. 8. Regularly audit and review router configurations to ensure minimal exposure and adherence to security best practices. These steps go beyond generic advice by focusing on immediate containment, monitoring, and proactive replacement strategies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c39b7ef31ef0b5614b9

Added to database: 2/25/2026, 9:40:09 PM

Last enriched: 2/26/2026, 4:22:12 AM

Last updated: 2/26/2026, 11:17:34 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats