CVE-2024-45698
moderate-risk
Published 2024-09-16
Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inject arbitrary OS commands, which can then be executed on the device.
Do I need to act?
~
1.9% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (2)
Dir-X4860 Firmware
Dir-X4860 Firmware
Affected Vendors
References (2)
Third Party Advisory
https://www.twcert.org.tw/en/cp-139-8091-bcd52-2.html
Third Party Advisory
https://www.twcert.org.tw/tw/cp-132-8090-bf06b-1.html
44
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
5/34 · Minimal
Exposure
7/34 · Low