Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39202: n/a

0
High
VulnerabilityCVE-2024-39202cvecve-2024-39202
Published: Mon Jul 08 2024 (07/08/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

D-Link DIR-823X firmware - 240126 was discovered to contain a remote command execution (RCE) vulnerability via the dhcpd_startip parameter at /goform/set_lan_settings.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:18:54 UTC

Technical Analysis

CVE-2024-39202 is a remote command execution (RCE) vulnerability identified in the firmware version 240126 of the D-Link DIR-823X router. The vulnerability arises from improper input validation of the dhcpd_startip parameter in the /goform/set_lan_settings endpoint, which is part of the router's LAN configuration interface. An attacker with low-level privileges and network access can exploit this flaw by sending crafted requests to this endpoint, injecting arbitrary commands that the system executes with the privileges of the affected service. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that the input is not properly sanitized before being passed to system-level commands. The CVSS v3.1 base score is 7.6, with attack vector 'Adjacent' (AV:A), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H), integrity (I:H), and low impact on availability (A:L). This means the attacker must be on the same or adjacent network segment but can execute commands that compromise sensitive data and system integrity. No patches are currently linked, and no exploits have been observed in the wild, but the vulnerability's characteristics suggest it could be weaponized quickly once publicized.

Potential Impact

The exploitation of CVE-2024-39202 can lead to severe consequences for organizations using the affected D-Link DIR-823X routers. Successful attacks allow adversaries to execute arbitrary commands remotely, potentially leading to full device compromise. This can result in unauthorized access to network traffic, interception or manipulation of data, disruption of network services, and pivoting to other internal systems. The confidentiality and integrity of sensitive information are at high risk, while availability impact is moderate but still notable due to possible service disruptions. Given the router's role as a network gateway, compromised devices could serve as persistent footholds for attackers, enabling espionage, data exfiltration, or launching further attacks within corporate or home networks. The requirement for low privileges and no user interaction lowers the barrier for exploitation, increasing the threat level. Organizations relying on these routers in critical infrastructure, enterprise, or residential environments face significant operational and security risks.

Mitigation Recommendations

To mitigate CVE-2024-39202, organizations should first verify if they are using the D-Link DIR-823X router with firmware version 240126 or earlier. Since no official patches are currently available, immediate steps include restricting access to the router's management interfaces to trusted network segments only, preferably via VLAN segmentation or firewall rules that block access to the /goform/set_lan_settings endpoint from untrusted sources. Enforce strong authentication and change default credentials to prevent unauthorized access. Monitor network traffic for unusual requests targeting the dhcpd_startip parameter or the LAN settings endpoint. Employ network intrusion detection systems (NIDS) with updated signatures to detect potential exploitation attempts. Where possible, isolate vulnerable devices from critical network assets to limit lateral movement. Regularly check for firmware updates from D-Link and apply patches promptly once released. Additionally, consider replacing affected devices with models that have no known vulnerabilities or have received timely security updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c83b7ef31ef0b565cca

Added to database: 2/25/2026, 9:41:23 PM

Last enriched: 2/28/2026, 4:18:54 AM

Last updated: 4/12/2026, 5:08:29 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses