
D-Link has addressed a critical unauthenticated remote code execution (RCE) vulnerability affecting its DSL-3788 router. The vulnerability, discovered by SECURE NETWORK BVTECH and reported to D-Link on November 25, 2024, could allow attackers to take complete control of affected devices.
The vulnerability resides in the webproc CGI component of the DSL-3788 firmware version v1.01R1B036_EU_EN and below. Attackers can exploit this flaw by sending a specially crafted session ID, which triggers a buffer overflow in the COMM_MakeCustomMsg function of the libssap library. This allows them to execute arbitrary code on the device with root privileges.
Successful exploitation of this vulnerability could have severe consequences, including:
- Complete device takeover: Attackers could gain full control of the router and its settings.
- Network compromise: Attackers could intercept and manipulate network traffic, launch attacks on other devices, or steal sensitive data.
- Malware installation: Attackers could install malware on the router to further compromise the network or launch other malicious activities.
D-Link has released a patched firmware version, v1.01R1B037, to address this vulnerability. Users of affected DSL-3788 routers are strongly urged to update their firmware immediately.
D-Link responded promptly to the vulnerability report, releasing patches within 90 days. The company emphasizes its commitment to network security and user privacy, stating that it has a dedicated task force to address security issues and implement necessary measures.
In addition to updating their firmware, users are advised to:
- Regularly check for updates: Ensure that the router is always running the latest firmware version.
- Change default credentials: Use strong and unique passwords for the router’s admin interface.
- Enable automatic updates: If available, configure the router to automatically install firmware updates.
- Consider a firewall: Use a firewall to add an extra layer of protection to the network.
Related Posts:
- APT organization steals D-Link company digital certificate to sign its malware
- D-Link Issues Warning on End-of-Life Routers Vulnerable to Botnet Exploits
- Hackers use Cisco Router flaws to attack Iran, 3,500 routers hacked
- US/UK warn Russia to hack into global routers
- Hackers Actively Exploiting Critical D-Link NAS Vulnerability: 90,000+ Devices at Risk