Overview
D-Link DIR-859 routers contain a path traversal vulnerability in the file /hedwig.cgi of the component HTTP POST Request Handler. Manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml allows for the leakage of session data potentially enabling privilege escalation and unauthorized control of the device. This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10371 ; https://nvd.nist.gov/vuln/detail/CVE-2024-0769
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2024-0769 |
| Vendor / Product | D-Link — DIR-859 Router |
| NVD Published | 2024-01-21 |
| NVD Last Modified | 2025-10-30 |
| CVSS 3.1 Score | 5.3 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
| Severity | MEDIUM |
| CWE | CWE-22 |
| CISA KEV Added | 2025-06-25 |
| CISA KEV Deadline | 2025-07-16 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Required Action
CISA BOD 22-01 Deadline: 2025-07-16.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Timeline
| Date | Event |
|---|---|
| 2025-06-25 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2025-07-16 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2024-0769 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |