CVE-2024-48634

8.0 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in D-Link DIR-882 and DIR-878 routers that allows attackers to execute arbitrary operating system commands via a crafted POST request to the SetWLanRadioSecurity function. Attackers can gain full control of affected routers, potentially compromising network security and connected devices. Users of DIR-882 firmware version 130B06 and DIR-878 firmware version 130B08 are affected.

💻 Affected Systems

Products:
  • D-Link DIR-882
  • D-Link DIR-878
Versions: DIR-882 firmware 130B06, DIR-878 firmware 130B08
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configurations when web management interface is accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise leading to network takeover, credential theft, malware deployment, and persistent backdoor installation.

🟠

Likely Case

Router configuration manipulation, network traffic interception, and lateral movement to connected devices.

🟢

If Mitigated

Limited impact if routers are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they gain network access, though external exploitation is more likely.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication to the router's web interface, but attackers may leverage default credentials or other vulnerabilities to gain access first.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check D-Link security bulletin for latest patched firmware versions

Vendor Advisory: https://www.dlink.com/en/security-bulletin/

Restart Required: Yes

Instructions:

1. Visit D-Link support website. 2. Download latest firmware for your router model. 3. Log into router web interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router after update completes.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevents external access to router web interface

Log into router web interface > Advanced > Remote Management > Disable

Change Default Credentials

all

Prevents unauthorized authentication to router interface

Log into router web interface > Management > Account > Change admin password

🧯 If You Can't Patch

  • Isolate routers in separate VLAN with strict firewall rules limiting inbound access
  • Implement network monitoring for unusual POST requests to router management interfaces

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface under Status > Firmware Information

Check Version:

No CLI command - check via web interface at http://router_ip/Status/system.html

Verify Fix Applied:

Verify firmware version matches or exceeds patched version from D-Link advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/SetWLanRadioSecurity
  • Multiple failed login attempts followed by successful authentication

Network Indicators:

  • Unusual outbound connections from router to external IPs
  • Suspicious commands in HTTP POST payloads to router

SIEM Query:

source="router_logs" AND (uri="/goform/SetWLanRadioSecurity" OR method="POST" AND uri CONTAINS "SetWLanRadioSecurity")

🔗 References

📤 Share & Export