Hackers are exploiting a critical vulnerability that affects all D-Link DIR-859 WiFi routers to collect account information from the device, including passwords.
The security issue was disclosed in January and is currently tracked as CVE-2024-0769 - a path traversal flaw that leads to information disclosure.
D-Link is not expected to release a fixing patch for CVE-2024-0769, so owners of the device should switch to a supported device as soon as possible.
Threat monitoring platform GreyNoise has observed the active exploitation of CVE-2024-0769 in attacks that rely on a slight variation of the public exploit.
The researchers explain that hackers are targeting the 'DEVICE.ACCOUNT.xml' file to dump all account names, passwords, user groups, and user descriptions present on the device.
The attack leverages a malicious POST request to '/hedwig.
Cgi,' exploiting CVE-2024-0769 to access sensitive configuration files via the 'fatlady.
Php' file, which potentially contains user credentials.
GreyNoise has not determined the motivation of the attackers, but the targeting of user passwords shows an intention to perform device takeover, thus giving the attacker full control of the device.
GreyNoise notes that the public proof-of-concept exploit, on which current attacks rely, targets the 'DHCPS6.
These files could expose configurations for access control lists, NAT, firewall settings, device accounts, and diagnostics, so defenders should be aware of them being potential targets for exploitation.
GreyNoise makes available a larger list of files that could be invoked in attacks that exploit CVE-2024-0769.
This should server defenders in case other variations occur.
SolarWinds Serv-U path traversal flaw actively exploited in attacks.
ASUS warns of critical remote authentication bypass on 7 routers.
Netgear WNR614 flaws allow device takeover, no fix available.
Malware botnet bricked 600,000 routers in mysterious 2023 attack.
Check Point VPN zero-day exploited in attacks since April 30.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Sat, 29 Jun 2024 15:20:31 +0000