Cyber Security News

Thousands of EOL D-Link Routers Vulnerable to Password Change Attacks

In a critical security disclosure, it has been revealed that thousands of end-of-life (EOL) D-Link DSL-6740C routers are vulnerable to password change attacks.

The vulnerability tracked as CVE-2024-11068 has been rated as critical by the TWCERT/CC, with an alarming CVSS score of 9.8.

The affected routers, no longer supported by D-Link as of January 15, 2024, are at high risk of unauthorized access and potential misuse.

Free Ultimate Continuous Security Monitoring Guide - Download Here (PDF)

CVE-2024-11068 – Unauthorized Configuration Access Vulnerability

The vulnerability allows attackers to gain unauthorized access to the router’s configuration, enabling them to change the device’s administrator password remotely.

Due to improper handling of privileged APIs in the router’s firmware, this can be accomplished without any prior authentication.

Once exploited, attackers could take full control of the affected routers, compromising connected networks’ integrity, confidentiality, and availability.

Affected Models

The affected routers are DSL-6740C, a model not available in the US market:

ModelRegionHardware RevisionEnd of SupportLegacy WebsiteLast Updated
DSL-6740CNon-USAll Series H/W Revisions01/15/2024No11/12/2024

Since the DSL-6740C routers have reached their End of Life (EOL) and End of Support (EOS), D-Link urges users to retire them and replace them with newer models.

No further firmware updates or customer support will be provided for these routers, leaving them vulnerable to future exploits.

D-Link recommends applying the latest firmware, changing default passwords, and ensuring Wi-Fi encryption is enabled for those who continue to use these devices.

The disclosure of CVE-2024-11068 reminds consumers to replace outdated and unsupported hardware.

Continued use of these routers could expose users to significant security risks, including unauthorized access and network compromise.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Cable: Powerful Post-Exploitation Toolkit for Active Directory Attacks

Cybersecurity researchers are raising alarms about Cable, a potent open-source post-exploitation toolkit designed to exploit Active…

1 hour ago

Langflow AI Builder Vulnerability Allows Remote Server Takeover by Attackers

A critical security vulnerability has been discovered in the Langflow AI Builder, a popular tool…

1 hour ago

Hackers Claim WooCommerce Breach Exposing 4.4 Million Customer Records

A hacker operating under the alias “Satanic” has claimed responsibility for a massive data breach…

2 hours ago

TP-Link Smart Hub Flaw Exposes Users’ Wi-Fi Credentials

A critical vulnerability has been discovered in TP-Link’s Smart Hub, potentially exposing users’ Wi-Fi credentials…

2 hours ago

APT32 Turns GitHub into a Weapon Against Security Teams and Enterprise Networks

Southeast Asian Advanced Persistent Threat (APT) group OceanLotus, also known as APT32, has been identified…

4 hours ago

AkiraBot Floods 80,000 Sites After Outsmarting CAPTCHAs and Slipping Past Network Defenses

AkiraBot, identified by SentinelLABS, represents a sophisticated spam bot framework that targets website chats and…

4 hours ago