CVE-2023-33735
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary commands on D-Link DIR-846 routers via the tomography_ping_address parameter in the HNAP1 interface. Attackers can gain full control of affected devices without authentication. All users of D-Link DIR-846 routers with the vulnerable firmware version are affected.
💻 Affected Systems
- D-Link DIR-846
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of router allowing attackers to intercept all network traffic, install persistent malware, pivot to internal network devices, and use the router as part of a botnet.
Likely Case
Router takeover leading to DNS hijacking, credential theft from network traffic, and installation of cryptocurrency miners or other malware.
If Mitigated
Limited impact if router is behind firewall with restricted WAN access and regular firmware updates are applied.
🎯 Exploit Status
Public exploit details available in GitHub repository. Simple HTTP request with crafted parameter can trigger RCE.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check D-Link security bulletin for latest patched version
Vendor Advisory: https://www.dlink.com/en/security-bulletin/
Restart Required: Yes
Instructions:
1. Log into router admin interface. 2. Navigate to firmware update section. 3. Download latest firmware from D-Link support site. 4. Upload and apply firmware update. 5. Reboot router after update completes.
🔧 Temporary Workarounds
Disable HNAP1 Interface
allDisable the vulnerable HNAP1 interface if not required for functionality
Restrict WAN Access
allConfigure firewall to block external access to router admin interface (port 80/443)
🧯 If You Can't Patch
- Replace router with updated model or different vendor
- Place router behind dedicated firewall with strict inbound rules
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface. If version is v1.00A52, device is vulnerable.
Check Version:
Check via router web interface or use: curl -s http://router-ip/HNAP1/ | grep firmware
Verify Fix Applied:
Verify firmware version has been updated to a version later than v1.00A52. Test HNAP1 interface with known exploit payloads (in controlled environment).
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /HNAP1 with tomography_ping_address parameter containing shell commands
- Multiple failed login attempts followed by successful HNAP1 access
Network Indicators:
- HTTP requests to router IP on port 80/443 with unusual parameter values
- Outbound connections from router to suspicious IPs
SIEM Query:
source="router-logs" AND (uri_path="/HNAP1" AND (param="tomography_ping_address" OR contains(param_value, "$") OR contains(param_value, "|")))