CVE-2024-4960

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in D-Link DAR-7000-40 allows remote attackers to upload arbitrary files via the licenseauthorization.php interface, potentially leading to system compromise. It affects D-Link DAR-7000-40 devices running version V31R02B1413C. Note that this product is end-of-life and no longer supported by the vendor.

💻 Affected Systems

Products:
  • D-Link DAR-7000-40
Versions: V31R02B1413C
Operating Systems: Embedded system
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects end-of-life products no longer supported by D-Link. Vulnerability exists in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system takeover, data exfiltration, and use as pivot point for network attacks.

🟠

Likely Case

Web shell upload allowing persistent backdoor access, file system manipulation, and credential theft.

🟢

If Mitigated

Limited impact if file uploads are blocked at network perimeter and systems are isolated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available in GitHub repository. Attack requires no authentication and is straightforward to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10354

Restart Required: No

Instructions:

No official patch available. Vendor confirms product is end-of-life. Recommended action is immediate replacement.

🔧 Temporary Workarounds

Block access to vulnerable endpoint

linux

Use firewall rules to block access to /interface/sysmanage/licenseauthorization.php

iptables -A INPUT -p tcp --dport 80 -m string --string "/interface/sysmanage/licenseauthorization.php" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "/interface/sysmanage/licenseauthorization.php" --algo bm -j DROP

Disable file upload functionality

all

Modify web server configuration to reject POST requests to the vulnerable endpoint

# Add to Apache config: <Location "/interface/sysmanage/licenseauthorization.php">
    LimitRequestBody 0
    Deny from all
</Location>
# Add to nginx config: location = /interface/sysmanage/licenseauthorization.php { return 403; }

🧯 If You Can't Patch

  • Immediately isolate affected devices from internet and critical internal networks
  • Implement strict network segmentation and monitor all traffic to/from affected devices

🔍 How to Verify

Check if Vulnerable:

Check if device is D-Link DAR-7000-40 running V31R02B1413C by accessing web interface or checking device label

Check Version:

Check web interface login page or device management interface for firmware version

Verify Fix Applied:

Test if /interface/sysmanage/licenseauthorization.php endpoint is accessible and accepts file uploads

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /interface/sysmanage/licenseauthorization.php with file upload parameters
  • Unusual file creation in web directories
  • Web shell access patterns

Network Indicators:

  • HTTP POST requests to vulnerable endpoint with file upload content
  • Unexpected outbound connections from device

SIEM Query:

source="web_logs" AND uri="/interface/sysmanage/licenseauthorization.php" AND method="POST" AND size>10000

🔗 References

📤 Share & Export