Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36755: n/a

0
Medium
VulnerabilityCVE-2024-36755cvecve-2024-36755
Published: Thu Jun 27 2024 (06/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

D-Link DIR-1950 up to v1.11B03 does not validate SSL certificates when requesting the latest firmware version and downloading URL. This can allow attackers to downgrade the firmware version or change the downloading URL via a man-in-the-middle attack.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:34:49 UTC

Technical Analysis

The vulnerability identified as CVE-2024-36755 affects the D-Link DIR-1950 router series up to firmware version 1.11B03. The core issue is the lack of SSL certificate validation when the router requests the latest firmware version and the associated download URL. This absence of validation allows an attacker positioned as a man-in-the-middle (MitM) on the network path to intercept and manipulate the firmware update process. Specifically, the attacker can downgrade the firmware version reported to the device or alter the URL from which the firmware is downloaded. Downgrading firmware can reintroduce previously patched vulnerabilities, while redirecting the download URL can lead to installation of malicious or tampered firmware images. The vulnerability is classified under CWE-599 (Improper Control of Resource Identifiers), highlighting the failure to properly verify the authenticity of resources fetched over the network. The CVSS v3.1 base score is 6.8, reflecting medium severity with a vector indicating that the attack requires adjacent network access (AV:A), high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H, I:H), but no impact on availability (A:N). Although no exploits have been reported in the wild, the vulnerability poses a significant risk because firmware integrity is critical to device security. Attackers exploiting this flaw could gain persistent control over the device or use it as a foothold to compromise internal networks. The vulnerability affects all devices running vulnerable firmware versions, which are widely used in home and small business environments worldwide.

Potential Impact

The impact of CVE-2024-36755 is primarily on the confidentiality and integrity of the affected routers and the networks they serve. By enabling an attacker to downgrade firmware or redirect firmware downloads, the vulnerability can lead to the installation of outdated or malicious firmware. This can result in unauthorized access, persistent backdoors, or the device being co-opted into botnets or other malicious activities. The integrity of the device's firmware is critical because compromised firmware can evade detection by traditional security controls and persist through reboots. For organizations, this can mean loss of control over network perimeter devices, exposure of sensitive internal network traffic, and potential lateral movement by attackers. Although availability is not directly impacted, the long-term compromise of routers can degrade network security posture and trustworthiness. The medium CVSS score reflects the requirement for adjacent network access and high attack complexity, which somewhat limits the attack surface but does not eliminate risk, especially in environments with untrusted or poorly segmented networks.

Mitigation Recommendations

To mitigate CVE-2024-36755, organizations should prioritize the following actions: 1) Monitor D-Link's official channels for firmware updates that address this vulnerability and apply patches promptly once available. 2) Restrict network access to the router's firmware update mechanism by segmenting management interfaces and limiting access to trusted networks only. 3) Employ network security controls such as VLANs, access control lists (ACLs), and intrusion detection/prevention systems (IDS/IPS) to detect and block man-in-the-middle attempts on local networks. 4) Use secure management protocols and VPNs for remote access to reduce exposure to adjacent network attacks. 5) Regularly audit router configurations and firmware versions to ensure compliance with security policies. 6) Educate network administrators about the risks of unvalidated SSL certificate usage and encourage verification of firmware integrity through cryptographic signatures if supported. 7) Consider deploying network monitoring tools that can detect anomalous firmware update traffic or unexpected DNS responses that might indicate MitM activity. These measures go beyond generic advice by focusing on network segmentation, monitoring, and proactive patch management tailored to the nature of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c64b7ef31ef0b563988

Added to database: 2/25/2026, 9:40:52 PM

Last enriched: 2/28/2026, 3:34:49 AM

Last updated: 4/12/2026, 3:40:34 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses