Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-41622: n/a

0
High
VulnerabilityCVE-2024-41622cvecve-2024-41622
Published: Tue Aug 27 2024 (08/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the tomography_ping_address parameter in /HNAP1/ interface.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:49:20 UTC

Technical Analysis

CVE-2024-41622 is a remote command execution (RCE) vulnerability identified in the D-Link DIR-846W A1 router firmware version FW100A43. The vulnerability resides in the /HNAP1/ interface, a web service endpoint used for router management and diagnostics. Specifically, the flaw is triggered via the tomography_ping_address parameter, which is improperly sanitized, allowing an attacker with low privileges (PR:L) to inject and execute arbitrary OS commands remotely over the network (AV:N) without requiring user interaction (UI:N). The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating command injection. The CVSS 3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation could allow attackers to take full control of the affected router, intercept or manipulate network traffic, disrupt connectivity, or use the device as a foothold for further attacks within the network. No patches or official fixes have been published yet, and no known exploits are currently reported in the wild. However, the presence of this vulnerability in a widely deployed consumer and small business router model poses a significant risk. The /HNAP1/ interface is often exposed on local networks and sometimes remotely, increasing the attack surface. Attackers could leverage this flaw to compromise home and SMB networks, potentially impacting sensitive data and network reliability.

Potential Impact

The impact of CVE-2024-41622 is substantial for organizations and individuals using the D-Link DIR-846W A1 router with the vulnerable firmware. Successful exploitation leads to remote command execution, granting attackers full control over the device. This can result in interception or manipulation of network traffic, disruption of internet connectivity, and the potential to launch further attacks on internal networks. Confidentiality is at risk as attackers may access sensitive information passing through the router. Integrity is compromised due to the ability to alter device configurations or inject malicious payloads. Availability can be affected by causing device crashes or network outages. For businesses, this could mean operational disruptions, data breaches, and reputational damage. The lack of a current patch increases the urgency for interim mitigations. The vulnerability's ease of exploitation (no user interaction needed, low privileges required) and network accessibility make it a high-risk threat globally, especially in environments where these routers are deployed without adequate network segmentation or firewall protections.

Mitigation Recommendations

1. Immediately restrict access to the /HNAP1/ interface by disabling remote management features or limiting access to trusted IP addresses only. 2. Implement network segmentation to isolate vulnerable routers from critical internal systems and sensitive data. 3. Monitor network traffic for unusual requests targeting the /HNAP1/ endpoint, especially those containing suspicious parameters like tomography_ping_address. 4. Use intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect command injection attempts against the router. 5. Regularly audit router firmware versions and configurations to identify vulnerable devices. 6. Apply vendor patches or firmware updates as soon as they become available. 7. Consider replacing affected devices with models that have a stronger security posture if patches are delayed. 8. Educate users and administrators about the risks of exposing management interfaces to untrusted networks. 9. Employ strong authentication and network access controls to reduce the risk of unauthorized access. 10. Maintain up-to-date backups of router configurations to facilitate recovery if compromise occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cbdb7ef31ef0b56894a

Added to database: 2/25/2026, 9:42:21 PM

Last enriched: 2/28/2026, 5:49:20 AM

Last updated: 4/11/2026, 9:25:55 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses