Description
D-Link has issued a warning regarding four Remote Code Execution (RCE) vulnerabilities affecting all hardware and firmware versions of its DIR-846W router. The company has stated that it will not be fixing these flaws, as the router has reached its end-of-life (EOL) and end-of-support (EOS) stages. The vulnerabilities, three of which are rated as critical, were discovered by security researcher yali-1002, who has withheld publishing proof-of-concept (PoC) exploits. Despite the seriousness of these vulnerabilities, D-Link recommends that users retire the device due to the lack of ongoing support.
Details
The four RCE vulnerabilities are as follows:
The DIR-846W routers, primarily sold outside the U.S., remain in use in various global markets despite having reached EOL in 2020. Given the nature of these flaws, the routers are at significant risk of being compromised by malware botnets like Mirai and Moobot, which could lead to devices being recruited into Distributed Denial of Service (DDoS) attacks.
Remediation
Since D-Link will not be releasing any patches for these vulnerabilities, the primary recommendation is to retire and replace the DIR-846W router with a supported model that receives regular security updates. If replacing the device is not immediately possible, users should take the following steps to mitigate risk:
The Guyana National CIRT recommends that users and administrators review this alert and apply it where necessary.
PDF Download: DLink DIR846W Routers Four Critical RCE Flaws Unfixed
References
Toulas, B. (2024b, September 3). D-Link says it is not fixing four RCE flaws in DIR-846W routers. Retrieved from BleepingComputer. https://www.bleepingcomputer.com/news/security/d-link-says-it-is-not-fixing-four-rce-flaws-in-dir-846w-routers/
Son, D. (2024, September 3). D-Link Won’t Fix 4 RCE Vulnerabilities in DIR-846W Router. Retrieved from Cybersecurity News. https://securityonline.info/d-link-wont-fix-4-rce-vulnerabilities-in-dir-846w-router/#:~:text=The%20D-Link%20DIR-846W%20routers%20affected%20by%20these%20vulnerabilities,not%20be%20providing%20patches%20to%20fix%20these%20issues.