Home / Vulnerabilities / CVE-2024-0769
MEDIUM SEVERITY
CVE-2024-0769 D-Link · DIR-859 Router

D-Link DIR-859 Router Path Traversal Vulnerability

Technical Severity

CVSS v3.1 Metrics

MEDIUM
5.3 / 10
Minimal Risk Critical
Vector Specification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Exploitation Likelihood

EPSS Prediction

68.92 %
Predictive Probability
Percentile Rank
98.6 th

Documented as more likely to be exploited than 98.6% of known CVEs.

Detection Date

Jun 25, 2025

Remediation Due

Jul 16, 2025

CISA Catalog Active

Threat Analysis

D-Link DIR-859 routers contain a path traversal vulnerability in the file /hedwig.cgi of the component HTTP POST Request Handler. Manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml allows for the leakage of session data potentially enabling privilege escalation and unauthorized control of the device. This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.

Remediation Directive

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

External Intelligence