Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-44340: n/a

0
High
VulnerabilityCVE-2024-44340cvecve-2024-44340
Published: Tue Aug 27 2024 (08/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via keys smartqos_express_devices and smartqos_normal_devices in SetSmartQoSSettings.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 07:51:08 UTC

Technical Analysis

CVE-2024-44340 identifies a remote command execution (RCE) vulnerability in the D-Link DIR-846W A1 router firmware version FW100A43. The vulnerability arises from improper input validation in the SetSmartQoSSettings function, specifically through the smartqos_express_devices and smartqos_normal_devices parameters. These parameters are used to configure Quality of Service (QoS) settings on the router. Due to insufficient sanitization of input, an attacker with low privileges can inject arbitrary operating system commands, which the router executes with elevated privileges. The vulnerability falls under CWE-78, indicating command injection flaws that allow attackers to execute arbitrary commands on the underlying OS. The CVSS v3.1 base score is 8.8, reflecting a network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker with some access to the device’s management interface or network can remotely execute commands, potentially taking full control of the device, intercepting or manipulating traffic, or disrupting network services. No patches or exploit code are currently publicly available, but the severity and nature of the flaw make it a critical concern for affected users.

Potential Impact

The impact of CVE-2024-44340 is significant for organizations using the D-Link DIR-846W A1 router, particularly those deploying it in enterprise, SMB, or critical infrastructure environments. Successful exploitation allows remote attackers to execute arbitrary commands with elevated privileges, leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network services, and use of the compromised router as a foothold for further lateral movement or launching attacks against other systems. The high confidentiality impact means sensitive information could be exposed; high integrity impact implies attackers can alter configurations or data; and high availability impact indicates potential denial of service. Since the router is often deployed in home and small office networks, exploitation could also affect remote workers or branch offices, expanding the attack surface. The lack of public exploits currently reduces immediate risk, but the vulnerability’s characteristics make it a prime target for attackers once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2024-44340, affected organizations should immediately assess their deployment of the D-Link DIR-846W A1 router with firmware FW100A43. Since no official patches are currently available, organizations should: 1) Restrict network access to the router’s management interfaces by implementing strict firewall rules and network segmentation to limit exposure to trusted administrators only. 2) Disable or restrict QoS configuration features if not required, reducing the attack surface related to SetSmartQoSSettings. 3) Monitor network traffic and router logs for unusual activity or unauthorized configuration changes indicative of exploitation attempts. 4) Change default credentials and enforce strong authentication mechanisms to reduce the risk of privilege escalation. 5) Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting command injection attempts on router management protocols. 6) Plan for rapid firmware updates once D-Link releases a security patch, and test updates in controlled environments before deployment. 7) Educate network administrators about the vulnerability and signs of compromise to improve detection and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cdcb7ef31ef0b569995

Added to database: 2/25/2026, 9:42:52 PM

Last enriched: 2/26/2026, 7:51:08 AM

Last updated: 4/12/2026, 6:13:49 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses