Article Details

Original Article Text

Click to Toggle View

D-Link won’t fix critical bug in 60,000 exposed EoL modems. Tens of thousands of exposed D-Link routers that have reached their end-of-life are vulnerable to a critical security issue that allows an unauthenticated remote attacker to change any user's password and take complete control of the device. The vulnerability was discovered in the D-Link DSL6740C modem by security researcher Chaio-Lin Yu (Steven Meow), who reported it to Taiwan’s computer and response center (TWCERTCC). It is worth noting that the device was not available in the U.S. and reached end-of-service (EoS) phase at the beginning of the year. In an advisory today, D-Link announced that it won't fix the issue and recommends "retiring and replacing D-Link devices that have reached EOL/EOS." Chaio-Lin Yu reported to TWCERTCC two other vulnerabilities, an OS command injection and a path traversal issue: The three flaws issues are summarized as follows: A quick search on the FOFA search engine for publicly exposed devices and software shows that there are close to 60,000 D-Link DSL6740C modems reachable over the internet, most of them in Taiwan. TWCERTCC has published advisories for four more high-severity OS command injection vulnerabilities that impact the same D-Link device. The bugs are tracked as CVE-2024-11062, CVE-2024-11063, CVE-2024-11064, and CVE-2024-11065. Although the number of vulnerable devices exposed on the public web is significant, D-Link has made it clear in the past [1, 2] that end-of-life (EoL) devices are not covered by updates, even when critical bugs are concerned. If users can't replace the affected device with a variant that the vendor still supports, they should at least restrict remote access and set secure access passwords.

Daily Brief Summary

DATA BREACH // Over 60,000 Vulnerable D-Link Modems Won't Receive Security Fixes

A critical security flaw found in D-Link DSL6740C modems allows an unauthenticated remote attacker to change any user’s password and take control of the device.

The vulnerability was reported to Taiwan's TWCERTCC by security researcher Chaio-Lin Yu.

Despite the severity, D-Link announced they will not fix the issue because the affected modems have reached their end-of-life (EoL) phase.

Around 60,000 of these vulnerable modems are publicly accessible via the internet, predominantly in Taiwan.

D-Link recommends users replace their end-of-life devices with supported models and restrict remote access.

Additional vulnerabilities, including high-severity OS command injection issues (CVE-2024-11062 to CVE-2024-11065), were found in the same device model.