PatchSiren cyber security CVE debrief
CVE-2021-45382 D-Link CVE debrief
CVE-2021-45382 is a remote code execution vulnerability affecting D-Link Multiple Routers. It was added to CISA’s Known Exploited Vulnerabilities catalog on 2022-04-04, which means defenders should treat it as actively exploited or at least a priority for urgent remediation. CISA’s guidance for the impacted product is especially direct: the device family is end-of-life and should be disconnected if still in use.
- Vendor
- D-Link
- Product
- Multiple Routers
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2022-04-04
- Original CVE updated
- 2022-04-04
- Advisory published
- 2022-04-04
- Advisory updated
- 2022-04-04
Who should care
Organizations that still operate or expose D-Link Multiple Routers, especially if the devices are end-of-life, internet-facing, or used in small-office or branch environments where replacement may have been delayed.
Technical summary
The supplied record identifies CVE-2021-45382 as a remote code execution issue in D-Link Multiple Routers. The CISA KEV entry classifies the impacted product as end-of-life and recommends disconnecting it if it remains deployed. No CVSS score was provided in the supplied corpus.
Defensive priority
High. Presence in CISA KEV and the end-of-life status of the affected product make this an urgent remediation item, with disconnect or replacement preferred over waiting for a patch.
Recommended defensive actions
- Inventory all D-Link Multiple Routers in your environment, including shadow IT and branch-office deployments.
- If the affected devices are still in use and cannot be immediately replaced, disconnect them from networks where they are not strictly required.
- Replace end-of-life D-Link routers with supported hardware and firmware.
- Remove any unnecessary internet exposure or remote administration paths while migration is underway.
- Segment networks so legacy devices cannot directly access sensitive assets.
- Review logs and alerting around the affected devices for signs of unexpected administration or compromise.
Evidence notes
This debrief is based on the supplied CVE metadata and the CISA KEV source item. The source item explicitly states the impacted product is end-of-life and should be disconnected if still in use. The CVE title and description identify the issue as a remote code execution vulnerability. No additional technical details or CVSS score were provided in the corpus.
Official resources
-
CVE-2021-45382 CVE record
CVE.org
-
CVE-2021-45382 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - The impacted product is end-of-life and should be disconnected if still in use.
-
Source item URL
cisa_kev
Publicly disclosed and listed by CISA in the Known Exploited Vulnerabilities catalog on 2022-04-04.