CVE-2024-57376
Published: 28 January 2025
Summary
CVE-2024-57376 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Dlink Dsr-150 Firmware. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 2.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires identification, reporting, and correction of the buffer overflow flaw via timely firmware updates for affected D-Link routers.
Mandates validation of information inputs to the router to prevent buffer overflows exploited by unauthenticated remote attackers.
Provides memory protections like non-executable memory regions to mitigate unauthorized code execution resulting from the buffer overflow.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow enables unauthenticated RCE on exposed router services/interfaces (adjacent network).
NVD Description
Buffer Overflow vulnerability in D-Link DSR-150, DSR-150N, DSR-250, DSR-250N, DSR-500N, DSR-1000N from 3.13 to 3.17B901C allows unauthenticated users to execute remote code execution.
Deeper analysisAI
CVE-2024-57376 is a buffer overflow vulnerability (CWE-120) present in D-Link routers, specifically the DSR-150, DSR-150N, DSR-250, DSR-250N, DSR-500N, and DSR-1000N models running firmware versions from 3.13 to 3.17B901C. The flaw allows unauthenticated users to achieve remote code execution.
The vulnerability can be exploited by unauthenticated attackers on an adjacent network (AV:A) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N), and without changing scope (S:U). Successful exploitation grants high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), as reflected in its CVSS v3.1 base score of 8.8.
D-Link has published a security bulletin with further details at https://www.dlink.com/en/security-bulletin/.
Details
- CWE(s)