CVE-2024-0769 — D-Link DIR-859 Router Path Traversal Vulnerability
Severity: Critical · Kind: Vulnerability
What it is
AI offline placeholder summary for: Title: CVE-2024-0769 — D-Link DIR-859 Router Path Traversal Vulnerability Kind:.
Who this affects
AI summarisation is currently disabled — see the source link for the full upstream advisory.
What to do
Re-run summarisation from /admin/threats once ANTHROPIC_API_KEY is configured.
From the source
D-Link DIR-859 Router. D-Link DIR-859 routers contain a path traversal vulnerability in the file /hedwig.cgi of the component HTTP POST Request Handler. Manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml allows for the leakage of session data potentially enabling privilege escalation and unauthorized control of the device. This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Vulnerability facts
- CVE
- CVE-2024-0769
- On CISA KEV since
- 2025-06-25
- Ransomware use
- Unknown
Was this useful?
Plain-English summaries are AI-generated and reviewed for tone, not technical accuracy. For incident response, always rely on the original source linked above.