PatchSiren cyber security CVE debrief
CVE-2024-0769 D-Link CVE debrief
CVE-2024-0769 is a path traversal vulnerability affecting the D-Link DIR-859 Router and is listed by CISA in the Known Exploited Vulnerabilities catalog. That KEV listing means CISA considers it actively exploited in the wild. Organizations that still use this model should treat it as a high-priority remediation item and follow the vendor’s guidance referenced by CISA.
- Vendor
- D-Link
- Product
- DIR-859 Router
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2025-06-25
- Original CVE updated
- 2025-06-25
- Advisory published
- 2025-06-25
- Advisory updated
- 2025-06-25
Who should care
Security and IT teams that manage D-Link DIR-859 Router deployments, especially where devices are internet-facing, remotely administered, or no longer closely maintained. Asset owners should also care if the router is used in branch, SOHO, lab, or legacy environments that may be overlooked during patching.
Technical summary
The available record identifies the issue as a path traversal vulnerability in the D-Link DIR-859 Router. In general, path traversal flaws can let an attacker access resources outside the intended directory scope. The supplied sources do not provide deeper technical impact details, so any specific outcome should be confirmed against the vendor advisory and NVD record. CISA’s KEV entry indicates the vulnerability is known to be exploited.
Defensive priority
High. CISA added this CVE to the Known Exploited Vulnerabilities catalog on 2025-06-25 with a remediation due date of 2025-07-16, which makes it time-sensitive for asset owners.
Recommended defensive actions
- Identify whether any D-Link DIR-859 Router instances are deployed in your environment.
- Apply mitigations per the vendor’s instructions referenced by CISA as soon as possible.
- If vendor mitigations are unavailable or the device cannot be secured adequately, discontinue use of the product.
- Review exposure for internet-facing or remotely accessible deployments first.
- Track remediation against the CISA KEV due date of 2025-07-16 and validate that affected devices are no longer vulnerable.
Evidence notes
This debrief is based on the CISA Known Exploited Vulnerabilities entry for CVE-2024-0769 and the official links provided in the source item metadata. The source identifies the issue as a D-Link DIR-859 Router path traversal vulnerability, marks it as known exploited, and points to the vendor announcement SAP10371 and the NVD record for additional detail. No unsupported impact or exploit specifics were added.
Official resources
-
CVE-2024-0769 CVE record
CVE.org
-
CVE-2024-0769 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
-
Source item URL
cisa_kev
Publicly disclosed vulnerability that is also listed in CISA’s Known Exploited Vulnerabilities catalog. This summary is defensive only and avoids exploit instructions or reproduction details.