CVE-2024-4960
📋 TL;DR
This critical vulnerability in D-Link DAR-7000-40 allows remote attackers to upload arbitrary files via the licenseauthorization.php interface, potentially leading to system compromise. It affects D-Link DAR-7000-40 devices running version V31R02B1413C. Note that this product is end-of-life and no longer supported by the vendor.
💻 Affected Systems
- D-Link DAR-7000-40
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system takeover, data exfiltration, and use as pivot point for network attacks.
Likely Case
Web shell upload allowing persistent backdoor access, file system manipulation, and credential theft.
If Mitigated
Limited impact if file uploads are blocked at network perimeter and systems are isolated.
🎯 Exploit Status
Exploit details are publicly available in GitHub repository. Attack requires no authentication and is straightforward to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10354
Restart Required: No
Instructions:
No official patch available. Vendor confirms product is end-of-life. Recommended action is immediate replacement.
🔧 Temporary Workarounds
Block access to vulnerable endpoint
linuxUse firewall rules to block access to /interface/sysmanage/licenseauthorization.php
iptables -A INPUT -p tcp --dport 80 -m string --string "/interface/sysmanage/licenseauthorization.php" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "/interface/sysmanage/licenseauthorization.php" --algo bm -j DROP
Disable file upload functionality
allModify web server configuration to reject POST requests to the vulnerable endpoint
# Add to Apache config: <Location "/interface/sysmanage/licenseauthorization.php">
LimitRequestBody 0
Deny from all
</Location>
# Add to nginx config: location = /interface/sysmanage/licenseauthorization.php { return 403; }
🧯 If You Can't Patch
- Immediately isolate affected devices from internet and critical internal networks
- Implement strict network segmentation and monitor all traffic to/from affected devices
🔍 How to Verify
Check if Vulnerable:
Check if device is D-Link DAR-7000-40 running V31R02B1413C by accessing web interface or checking device label
Check Version:
Check web interface login page or device management interface for firmware version
Verify Fix Applied:
Test if /interface/sysmanage/licenseauthorization.php endpoint is accessible and accepts file uploads
📡 Detection & Monitoring
Log Indicators:
- POST requests to /interface/sysmanage/licenseauthorization.php with file upload parameters
- Unusual file creation in web directories
- Web shell access patterns
Network Indicators:
- HTTP POST requests to vulnerable endpoint with file upload content
- Unexpected outbound connections from device
SIEM Query:
source="web_logs" AND uri="/interface/sysmanage/licenseauthorization.php" AND method="POST" AND size>10000
🔗 References
- https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/%3CWHB%7Cj%5CIbSU0m4%3A_/D-LINK-DAR-7000_upload_%20licenseauthorization.php.php.pdf
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10354
- https://vuldb.com/?ctiid.264528
- https://vuldb.com/?id.264528
- https://vuldb.com/?submit.333777
- https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/%3CWHB%7Cj%5CIbSU0m4%3A_/D-LINK-DAR-7000_upload_%20licenseauthorization.php.php.pdf
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10354
- https://vuldb.com/?ctiid.264528
- https://vuldb.com/?id.264528
- https://vuldb.com/?submit.333777