CVE-2024-11960
📋 TL;DR
A critical buffer overflow vulnerability in D-Link DIR-605L routers allows remote attackers to execute arbitrary code by manipulating the curTime parameter in the formSetPortTr function. This affects all users of DIR-605L firmware version 2.13B01. Successful exploitation could give attackers full control of the router.
💻 Affected Systems
- D-Link DIR-605L
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, credential theft, network pivoting, and persistent backdoor installation.
Likely Case
Router takeover enabling traffic interception, DNS hijacking, and network disruption.
If Mitigated
Limited impact if device is behind firewall with restricted WAN access and updated firmware.
🎯 Exploit Status
Public exploit code available on GitHub, making exploitation straightforward for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check D-Link support for latest firmware
Vendor Advisory: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10393
Restart Required: Yes
Instructions:
1. Visit D-Link support site 2. Download latest firmware for DIR-605L 3. Log into router admin interface 4. Navigate to firmware update section 5. Upload and apply new firmware 6. Reboot router
🔧 Temporary Workarounds
Disable remote management
allPrevent external access to router administration interface
Network segmentation
allIsolate router on separate VLAN with restricted access
🧯 If You Can't Patch
- Replace with supported router model
- Implement strict firewall rules blocking all WAN access to router management interface
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface under System > Firmware
Check Version:
Login to router web interface and navigate to firmware information page
Verify Fix Applied:
Confirm firmware version is updated beyond 2.13B01
📡 Detection & Monitoring
Log Indicators:
- Multiple POST requests to /goform/formSetPortTr with long curTime parameters
- Unusual process execution in router logs
Network Indicators:
- Exploit traffic patterns to router management port
- Unusual outbound connections from router
SIEM Query:
source="router_logs" AND uri="/goform/formSetPortTr" AND (param_length>100 OR status_code=500)