CVE-2024-0769

D-Link DIR-859 HTTP POST Request hedwig.cgi path traversal

Basic Information

CVE State
PUBLISHED
Reserved Date
January 20, 2024
Published Date
January 21, 2024
Last Updated
June 26, 2025
Vendor
D-Link
Product
DIR-859
Description
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. Eine kritische Schwachstelle wurde in D-Link DIR-859 1.06B01 ausgemacht. Es geht hierbei um eine nicht näher spezifizierte Funktion der Datei /hedwig.cgi der Komponente HTTP POST Request Handler. Durch Manipulieren des Arguments service mit der Eingabe ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
Tags
cisa

CVSS Scores

CVSS v3.1

5.3 - MEDIUM

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS v3.0

5.3 - MEDIUM

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS v2.0

5.0

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS Score

Score
75.76% (Percentile: 98.85%) as of 2025-07-03

SSVC Information

Exploitation
active
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2025-06-25 16:45:18 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2025-06-25 16:45:11 UTC

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Added to KEVIntel