**Hackers exploit critical D-Link DIR-859 router flaw to steal passwords**

If you or anyone you know is using this device, now would be a good time to upgrade.

https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-d-link-dir-859-router-flaw-to-steal-passwords/

"Hackers are exploiting a critical vulnerability that affects all D-Link DIR-859 WiFi routers to collect account information from the device, including passwords.

The security issue was disclosed in January and is currently tracked as CVE-2024-0769 (9.8 severity score) - a path traversal flaw that leads to information disclosure.

Although D-Link DIR-859 WiFi router model reached end-of-life (EoL) and no longer receives any updates, the vendor still released a security advisory explaining that the flaw exists in the "fatlady.php" file of the device, affects all firmware versions, and allows attackers to leak session data, achieve privilege escalation, and gain full control via the admin panel.

D-Link is not expected to release a fixing patch for CVE-2024-0769, so owners of the device should switch to a supported device as soon as possible."

#cybersecgirl

Reply to this note

Please Login to reply.

Discussion

What the hell does fatlady.php do? 😂

What's your thoughts on zero trust for home networks?

I'm a big fan of "never trust by default", so many hackers bypass a firewall by walking in and physically jacking-in behind it using social engineering. It should be the default for companies, and depending on your threat model, for home networks as well. Everything is a tradeoff between privacy/security and convenience.