September 6th, 2024

D-Link says it is not fixing four RCE flaws in DIR-846W routers

D-Link will not address four critical RCE vulnerabilities in DIR-846W routers, advising users to replace them or enhance security settings, as exploitation could pose risks to connected devices.

Read original articleLink Icon
D-Link says it is not fixing four RCE flaws in DIR-846W routers

D-Link has announced that it will not address four critical remote code execution (RCE) vulnerabilities affecting its DIR-846W routers, as these devices have reached the end of their support lifecycle. The vulnerabilities, discovered by a security researcher, include three rated as critical and one as high, with the potential for exploitation without authentication. The flaws are detailed as follows: CVE-2024-41622, CVE-2024-44340, CVE-2024-44341, and CVE-2024-44342, with CVSS scores ranging from 8.8 to 9.8. D-Link's policy states that once products reach end-of-life, they will no longer receive security updates. The company advises users to retire the DIR-846W and replace it with a supported model. For those unable to do so, D-Link recommends ensuring the device runs the latest firmware, using strong passwords, and enabling WiFi encryption. The DIR-846W routers, primarily sold outside the U.S., may still pose a risk globally, as many users tend to keep their devices long after support has ended. The vulnerabilities could be exploited by malware botnets, emphasizing the need for immediate action to secure these routers.

- D-Link will not fix four critical RCE vulnerabilities in DIR-846W routers.

- The vulnerabilities are rated critical and do not require authentication for exploitation.

- D-Link advises users to retire the DIR-846W and replace it with a supported model.

- Users unable to replace the router should update firmware and enhance security settings.

- The vulnerabilities could be exploited by malware, posing risks to connected devices.

Link Icon 1 comments