CVE-2024-37630

8.8 HIGH

📋 TL;DR

D-Link DIR-605L routers contain a hardcoded root password in the /etc/passwd file, allowing attackers to gain full administrative control. This affects all users of DIR-605L firmware version 2.13B01. Attackers can exploit this without any authentication.

💻 Affected Systems

Products:
  • D-Link DIR-605L
Versions: v2.13B01
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running this firmware version are vulnerable out-of-the-box.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to intercept all network traffic, install persistent malware, pivot to internal networks, and disable security features.

🟠

Likely Case

Attackers gain root access to modify router settings, redirect DNS, capture credentials, and use the device as a foothold for further attacks.

🟢

If Mitigated

If isolated from internet and with strict network segmentation, impact limited to local network compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only SSH/Telnet access to the router with the hardcoded credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Check D-Link website for firmware updates. If none exist, replace device.

🔧 Temporary Workarounds

Change root password

linux

Manually change the root password via SSH/Telnet if accessible

passwd root

Disable remote administration

all

Turn off remote management in router settings

🧯 If You Can't Patch

  • Immediately isolate affected routers from internet and critical networks
  • Replace vulnerable devices with supported models

🔍 How to Verify

Check if Vulnerable:

SSH/Telnet to router and attempt login with hardcoded credentials found in public reports

Check Version:

Check router web interface or run 'cat /etc/version' via SSH

Verify Fix Applied:

Verify root password has been changed and cannot be accessed with known hardcoded credentials

📡 Detection & Monitoring

Log Indicators:

  • Failed SSH/Telnet login attempts followed by successful root login
  • Unusual configuration changes

Network Indicators:

  • Unexpected SSH/Telnet connections to router
  • DNS changes or unusual outbound traffic

SIEM Query:

source="router_logs" (event="authentication success" AND user="root")

🔗 References

📤 Share & Export