CVE-2024-11068
📋 TL;DR
CVE-2024-11068 is a critical vulnerability in D-Link DSL6740C modems that allows unauthenticated remote attackers to change any user's password via API calls. This grants attackers access to web management, SSH, and Telnet services using compromised credentials. Approximately 60,000 end-of-life modems are affected with no official patch available.
💻 Affected Systems
- D-Link DSL6740C
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of modem with administrative access to all services (web, SSH, Telnet), enabling network interception, device reconfiguration, credential theft, and potential lateral movement to connected devices.
Likely Case
Remote attackers gain administrative access to modem management interface, allowing them to change network settings, intercept traffic, or use the device as an attack pivot point.
If Mitigated
If modem is behind firewall with no WAN access, risk is limited to internal attackers only.
🎯 Exploit Status
Exploitation requires only HTTP requests to the vulnerable API endpoint. Public technical details and proof-of-concept are available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: None
Vendor Advisory: https://www.twcert.org.tw/en/cp-139-8234-0514c-2.html
Restart Required: No
Instructions:
No official patch available. D-Link has declared these devices end-of-life and will not provide security updates.
🔧 Temporary Workarounds
Disable remote management
allDisable WAN access to modem management interface
Access modem web interface > Advanced > Remote Management > Disable
Change default credentials
allChange all default passwords including admin, user, and support accounts
Access modem web interface > Management > Password > Change all passwords
🧯 If You Can't Patch
- Replace affected modems with supported models
- Place modem behind firewall with strict inbound rules blocking all WAN access to management interfaces
🔍 How to Verify
Check if Vulnerable:
Check if device model is DSL6740C and if web management interface is accessible from WAN
Check Version:
Check modem web interface status page or use 'telnet [modem_ip]' and check banner
Verify Fix Applied:
Test if password change API endpoint returns error for unauthenticated requests
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts followed by successful login from new IP
- Password change events for admin/user accounts
- Unusual API calls to password change endpoints
Network Indicators:
- HTTP POST requests to password change API endpoints from external IPs
- Sudden increase in SSH/Telnet connections from new sources
SIEM Query:
sourceIP=external AND (uri_path CONTAINS "/password" OR uri_path CONTAINS "/user") AND http_method=POST