Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-41611: n/a

0
Critical
VulnerabilityCVE-2024-41611cvecve-2024-41611
Published: Tue Jul 30 2024 (07/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-41611 is a critical vulnerability in the D-Link DIR-860L REVA router firmware patch 1. 10.. B04 where the Telnet service contains hardcoded credentials. This flaw allows unauthenticated remote attackers to log in via Telnet and execute arbitrary commands with full control over the device. The vulnerability has a CVSS score of 9. 8, indicating critical severity with high impact on confidentiality, integrity, and availability. Exploitation requires no user interaction or privileges and can lead to complete device compromise. Although no known exploits are currently reported in the wild, the presence of hardcoded credentials in network infrastructure devices poses a significant risk. Organizations using this router model should urgently update firmware or disable Telnet access to mitigate the threat. Countries with widespread use of D-Link consumer and SMB routers, especially in Asia, Europe, and the Americas, are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:11:34 UTC

Technical Analysis

CVE-2024-41611 identifies a critical security vulnerability in the D-Link DIR-860L REVA router firmware patch version 1.10..B04. The issue arises from hardcoded credentials embedded within the Telnet service, a legacy protocol often used for remote management. These hardcoded credentials allow any remote attacker to authenticate without prior knowledge of legitimate passwords, bypassing all authentication controls. Once logged in, the attacker can execute arbitrary commands on the router with administrative privileges, potentially taking full control of the device. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), a well-known weakness that undermines authentication security. The CVSS v3.1 base score of 9.8 reflects the vulnerability's ease of exploitation (network vector, no privileges or user interaction required) and its severe impact on confidentiality, integrity, and availability. The flaw affects a widely deployed consumer and small business router model, which is often connected directly to the internet or internal networks, increasing the attack surface. Although no public exploits have been reported yet, the presence of hardcoded credentials is a critical security lapse that attackers can easily leverage to gain persistent unauthorized access, modify configurations, intercept or redirect traffic, or launch further attacks within the network. The lack of available patches or updates at the time of disclosure further exacerbates the risk, emphasizing the need for immediate mitigation steps.

Potential Impact

The impact of CVE-2024-41611 is severe and multifaceted. Attackers exploiting this vulnerability can gain full administrative access to affected routers remotely without authentication, enabling them to alter device configurations, intercept or manipulate network traffic, and potentially pivot to other internal systems. This compromises the confidentiality of data traversing the network, the integrity of routing and firewall rules, and the availability of network services. For organizations, this can lead to data breaches, network outages, unauthorized surveillance, and the deployment of malware or ransomware. Small and medium businesses and home users relying on the DIR-860L REVA router are particularly vulnerable, as these devices often lack additional security controls. The vulnerability also poses risks to ISPs and managed service providers who deploy these routers at customer premises. The broad impact on network infrastructure and the critical nature of the flaw make it a high-priority security concern globally.

Mitigation Recommendations

To mitigate CVE-2024-41611, affected organizations should immediately disable the Telnet service on the D-Link DIR-860L REVA routers if possible, as Telnet is an insecure protocol and generally unnecessary. If disabling Telnet is not feasible, network administrators should restrict access to the Telnet port (usually TCP 23) using firewall rules to allow only trusted management IP addresses. Monitoring network traffic for unusual Telnet connections can help detect exploitation attempts. Since no official patch is currently available, users should consider upgrading to a newer router model or firmware version that does not contain hardcoded credentials. Additionally, implementing network segmentation to isolate vulnerable devices and deploying intrusion detection/prevention systems (IDS/IPS) can reduce the risk of lateral movement. Vendors and users should advocate for timely firmware updates and transparency regarding security issues. Finally, organizations should review and update their device management policies to avoid using legacy protocols like Telnet and enforce strong authentication mechanisms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cbcb7ef31ef0b5688e7

Added to database: 2/25/2026, 9:42:20 PM

Last enriched: 2/26/2026, 7:11:34 AM

Last updated: 2/26/2026, 8:06:20 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats