DIVD-2024-00049 - Vulnerabilities in D-Link NAS: Backdoor and Command Injection Exploits
Our reference | DIVD-2024-00049 |
Case lead | Koen Schagen |
Author | Stan Plasmeijer |
Researcher(s) |
|
CVE(s) | |
Products |
|
Versions |
|
Recommendation | Phase out the D-Link device or place it behind a VPN or an IP allowlist |
Patch status | None |
Workaround | None |
Status | Open |
Last modified | 02 Dec 2024 23:18 CET |
Summary
Certain legacy D-Link NAS models are affected by two critical vulnerabilities: a backdoor facilitated by hardcoded credentials and a command injection vulnerability. The backdoor account, with the username “messagebus,” does not require a password, allowing attackers to easily gain unauthorized access. Additionally, the command injection vulnerability lies in the account_mgr.cgi URI, where the argument name can be manipulated to execute arbitrary shell commands. Attackers who successfully exploit these vulnerabilities could execute arbitrary commands on the vulnerable devices, potentially gaining access to sensitive information, modifying system configurations, and more.
Recommendations
These vulnerabilities impact legacy D-Link products that have reached their end-of-life (“EOL”) or end-of-service-life (“EOS”) status, meaning they no longer receive software updates or security patches from D-Link. As there is no patch available, it is recommended to either phase out these devices or place them behind a VPN or an IP allowlist to prevent unauthorized access. Additionally, users should ensure that these devices have the latest available firmware, update passwords frequently, and enable Wi-Fi encryption with unique passwords. It is also advised not to expose management interfaces to the internet.
What we are doing
DIVD is currently working to identify parties that are running a vulnerable version of D-Link and to notify these parties.
Timeline
Date | Description |
---|---|
02 Dec 2024 | DIVD starts researching the vulnerability. |
02 Dec 2024 | DIVD finds fingerprint, preparing to scan. |
02 Dec 2024 | DIVD starts scanning the internet for vulnerable instances. |
02 Dec 2024 | DIVD starts notifying network owners with a vulnerable devices in their network. |