PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-0769 D-Link CVE debrief

CVE-2024-0769 is a path traversal vulnerability affecting the D-Link DIR-859 Router and is listed by CISA in the Known Exploited Vulnerabilities catalog. That KEV listing means CISA considers it actively exploited in the wild. Organizations that still use this model should treat it as a high-priority remediation item and follow the vendor’s guidance referenced by CISA.

Vendor
D-Link
Product
DIR-859 Router
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2025-06-25
Original CVE updated
2025-06-25
Advisory published
2025-06-25
Advisory updated
2025-06-25

Who should care

Security and IT teams that manage D-Link DIR-859 Router deployments, especially where devices are internet-facing, remotely administered, or no longer closely maintained. Asset owners should also care if the router is used in branch, SOHO, lab, or legacy environments that may be overlooked during patching.

Technical summary

The available record identifies the issue as a path traversal vulnerability in the D-Link DIR-859 Router. In general, path traversal flaws can let an attacker access resources outside the intended directory scope. The supplied sources do not provide deeper technical impact details, so any specific outcome should be confirmed against the vendor advisory and NVD record. CISA’s KEV entry indicates the vulnerability is known to be exploited.

Defensive priority

High. CISA added this CVE to the Known Exploited Vulnerabilities catalog on 2025-06-25 with a remediation due date of 2025-07-16, which makes it time-sensitive for asset owners.

Recommended defensive actions

  • Identify whether any D-Link DIR-859 Router instances are deployed in your environment.
  • Apply mitigations per the vendor’s instructions referenced by CISA as soon as possible.
  • If vendor mitigations are unavailable or the device cannot be secured adequately, discontinue use of the product.
  • Review exposure for internet-facing or remotely accessible deployments first.
  • Track remediation against the CISA KEV due date of 2025-07-16 and validate that affected devices are no longer vulnerable.

Evidence notes

This debrief is based on the CISA Known Exploited Vulnerabilities entry for CVE-2024-0769 and the official links provided in the source item metadata. The source identifies the issue as a D-Link DIR-859 Router path traversal vulnerability, marks it as known exploited, and points to the vendor announcement SAP10371 and the NVD record for additional detail. No unsupported impact or exploit specifics were added.

Official resources

Publicly disclosed vulnerability that is also listed in CISA’s Known Exploited Vulnerabilities catalog. This summary is defensive only and avoids exploit instructions or reproduction details.