Security News > 2024 > May > PoC exploit released for RCE zero-day in D-Link EXO AX4800 routers
The D-Link EXO AX4800 router is vulnerable to remote unauthenticated command execution that could lead to complete device takeovers by attackers with access to the HNAP port.
The D-Link DIR-X4860 router is a high-performance Wi-Fi 6 router capable of speeds of up to 4800 Mbps and advanced features like OFDMA, MU-MIMO, and BSS Coloring that enhance efficiency and reduce interference.
Accessing the Home Network Administration Protocol port on the D-Link DIR-X4860 router is relatively straightforward in most cases, as it's usually HTTP or HTTPS accessible through the router's remote management interface.
The attack begins with a specially crafted HNAP login request to the router's management interface, which includes a parameter named 'PrivateLogin' set to "Username" and a username of "Admin".
The vulnerable 'SetVirtualServerSettings' function processes the 'LocalIPAddress' parameter without proper sanitization, allowing the injected command to execute in the context of the router's operating system.
Exploit released for Palo Alto PAN-OS bug used in attacks, patch now.
News URL
Related news
- D-Link says it is not fixing four RCE flaws in DIR-846W routers (source)
- Adobe fixes Acrobat Reader zero-day with public PoC exploit (source)
- D-Link fixes critical RCE, hardcoded password flaws in WiFi 6 routers (source)
- Volt Typhoon Hackers Exploit Zero-Day Vulnerability in Versa Director Servers Used by MSPs, ISPs (source)
- Malware exploits 5-year-old zero-day to infect end-of-life IP cameras (source)
- North Korean hackers exploit Chrome zero-day to deploy rootkit (source)
- North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit (source)
- Week in review: SonicWall critical firewalls flaw fixed, APT exploits WPS Office for Windows RCE (source)
- Adobe completes fix for Reader bug with known PoC exploit (CVE-2024-41869) (source)
- Adobe fixed Acrobat bug, neglected to mention whole zero-day exploit thing (source)