Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5291: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in D-Link DIR-2150

0
High
VulnerabilityCVE-2024-5291cvecve-2024-5291cwe-78
Published: Thu May 23 2024 (05/23/2024, 21:29:29 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-2150

Description

CVE-2024-5291 is a high-severity OS command injection vulnerability in the D-Link DIR-2150 router's SOAP API interface, which listens on TCP port 80. This flaw allows network-adjacent attackers to execute arbitrary code with root privileges without requiring authentication or user interaction. The vulnerability arises from improper validation of user-supplied input used in system calls, enabling remote code execution. Exploitation could lead to full compromise of affected devices, impacting confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations using the affected firmware version 1. 06B01 should prioritize patching or apply mitigations to prevent exploitation. Countries with significant deployment of D-Link routers and strategic reliance on such network infrastructure are at higher risk. Immediate action is recommended to secure vulnerable devices and monitor network traffic for suspicious activity.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:29:49 UTC

Technical Analysis

CVE-2024-5291 is an OS command injection vulnerability identified in the D-Link DIR-2150 router, specifically affecting firmware version 1.06B01. The vulnerability exists in the router's SOAP API interface, which operates on TCP port 80 by default. The root cause is improper neutralization of special elements in user-supplied input before it is passed to system calls, classified under CWE-78. This lack of input validation allows an attacker positioned on the same network segment (network-adjacent) to inject arbitrary OS commands remotely without any authentication or user interaction. Successful exploitation grants the attacker root-level code execution on the device, enabling full control over the router. This can lead to unauthorized configuration changes, interception or redirection of network traffic, deployment of persistent malware, or use of the device as a pivot point for further attacks within the network. The vulnerability was assigned a CVSS v3.0 base score of 8.8, reflecting its high impact on confidentiality, integrity, and availability, combined with ease of exploitation. Although no public exploits have been reported yet, the severity and nature of the flaw make it a critical risk for affected users. The vulnerability was disclosed by the Zero Day Initiative (ZDI) under advisory ZDI-CAN-21235. No official patches have been linked yet, so mitigation relies on network segmentation, disabling the vulnerable service if possible, or applying vendor updates once available.

Potential Impact

The impact of CVE-2024-5291 is significant for organizations using the D-Link DIR-2150 router with vulnerable firmware. Exploitation allows attackers to gain root access remotely without authentication, leading to complete compromise of the device. This can result in interception and manipulation of network traffic, disruption of network services, unauthorized access to internal resources, and potential lateral movement within corporate or home networks. The confidentiality of sensitive data traversing the router can be compromised, integrity of network configurations can be altered, and availability of network connectivity can be disrupted. For enterprises relying on these routers for critical connectivity, this vulnerability poses a severe operational and security risk. Additionally, compromised routers can be enlisted into botnets or used as launch points for further attacks, amplifying the threat landscape. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation given the ease of exploitation and high privileges gained.

Mitigation Recommendations

To mitigate CVE-2024-5291, organizations should immediately identify all D-Link DIR-2150 routers running firmware version 1.06B01 or earlier. Until an official patch is released, consider the following specific actions: 1) Disable or restrict access to the SOAP API interface on TCP port 80, ideally limiting it to trusted management networks only. 2) Implement network segmentation to isolate vulnerable devices from untrusted or guest networks to reduce exposure to network-adjacent attackers. 3) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection rules targeting suspicious SOAP API requests or command injection patterns. 4) Monitor router logs and network traffic for unusual activities indicative of exploitation attempts. 5) Regularly check for firmware updates from D-Link and apply patches promptly once available. 6) If possible, replace vulnerable devices with models not affected by this issue or with updated firmware. 7) Educate network administrators about the risks of exposing management interfaces to untrusted networks and enforce strict access controls. These targeted mitigations go beyond generic advice by focusing on reducing attack surface and early detection of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-05-23T21:19:55.691Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6be3b7ef31ef0b55bd47

Added to database: 2/25/2026, 9:38:43 PM

Last enriched: 2/26/2026, 2:29:49 AM

Last updated: 2/26/2026, 11:24:47 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats