D-Link DIR-859 Router Path Traversal Vulnerability

Summary

CVECVE-2024-0769
StatePUBLISHED
AssignerUnknown
Source PriorityCVE Program / NVD first with legacy fallback
Published2024-01-21 08:15:00 UTC
Updated2024-01-29 15:25:00 UTC
DescriptionD-Link DIR-859 routers contain a path traversal vulnerability in the file /hedwig.cgi of the component HTTP POST Request Handler. Manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml allows for the leakage of session data potentially enabling privilege escalation and unauthorized control of the device. This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.

Risk And Classification

EPSS: 0.752390000 probability, percentile 0.988900000 (date 2026-04-22)

CISA KEV: Listed on 2025-06-25; due 2025-07-16; ransomware use Unknown

Problem Types: CWE-22

CISA Known Exploited Vulnerability

VendorD-Link
ProductDIR-859 Router
Name D-Link DIR-859 Router Path Traversal Vulnerability
Required ActionApply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Noteshttps://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10371 ; https://nvd.nist.gov/vuln/detail/CVE-2024-0769

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Hardware Dlink Dir-859 - All All All
Operating System Dlink Dir-859 Firmware 1.06 beta1 All All

References

ReferenceSourceLinkTags
cve-reported/CVE-2024-0769/CVE-2024-0769.md at main · c2dc/cve-reported · GitHub github.com Exploit, Third Party Advisory
D-Link Technical Support supportannouncement.us.dlink.com Vendor Advisory
CVE-2024-0769: D-Link DIR-859 HTTP POST Request hedwig.cgi path traversal vuldb.com Third Party Advisory, VDB Entry
CVE-2024-0769: D-Link DIR-859 HTTP POST Request hedwig.cgi path traversal vuldb.com Permissions Required, VDB Entry
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
CISA Known Exploited Vulnerabilities catalog CISA www.cisa.gov kev
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report