Security researchers have confirmed active exploitation of CVE-2024-0769, a critical path traversal vulnerability (CVSS 9.8) affecting all D-Link DIR-859 WiFi routers.
This flaw enables unauthenticated attackers to access sensitive configuration files, extract credentials, and gain full device control.
The routers reached end-of-life (EoL) in December 2020, meaning no security patches will be released, leaving devices permanently vulnerable.
The flaw resides in the /hedwig.cgi HTTP POST request handler, where manipulation of the service The argument allows directory traversal.
Attackers craft inputs like ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml to bypass security controls (CWE-22).
Observed exploits target DEVICE.ACCOUNT.xml to extract:
/hedwig.cgi. fatlady.php file to access configuration data, potentially exposing firewall settings, NAT rules, and access controls.With 87/100 on the SVRS risk scale, compromised routers enable:
D-Link’s advisory mandates immediate device retirement.
For organizations unable to replace routers immediately:
/hedwig.cgiFind this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates
The post CISA Issues Alert on D-Link Path Traversal Vulnerability Targeted in Attacks appeared first on Cyber Security News.
An active campaign by the Interlock ransomware group is exploiting a critical zero-day vulnerability (CVE-2026-20131)…
A sophisticated full-chain iOS exploit kit dubbed DarkSword, actively deployed by multiple commercial surveillance vendors and…
Why do so many SOCs still struggle to move quickly even with strong detection tools…
A bill requiring public schools to check the immigration status of all kids in grades…
Now is the time to retire that pedal-powered bike of yours and upgrade to electric.…
Magic: The Gathering’s second set of the year has given us the Teenage Mutant Ninja…
This website uses cookies.