CVE-2024-57595
Published: 27 January 2025
Summary
CVE-2024-57595 is a critical-severity OS Command Injection (CWE-78) vulnerability in Dlink (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 14.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validating the wps_pin parameter in POST requests to apc_client_pin.cgi to block OS command injection payloads.
Restricts wps_pin inputs to valid formats like 8-digit PINs, preventing injection of arbitrary OS commands.
Mandates identification, reporting, and patching of the command injection flaw in DIR-825 REVB firmware version 2.03.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in unauthenticated public CGI endpoint directly enables remote exploitation of public-facing app (T1190) and arbitrary Unix shell command execution (T1059.004).
NVD Description
DLINK DIR-825 REVB 2.03 devices have an OS command injection vulnerability in the CGl interface apc_client_pin.cgi, which allows remote attackers to execute arbitrary commands via the parameter "wps_pin" passed to the apc_client_pin.cgi binary through a POST request.
Deeper analysisAI
CVE-2024-57595 is an OS command injection vulnerability (CWE-78) affecting D-Link DIR-825 REVB devices running firmware version 2.03. The flaw resides in the CGI interface script apc_client_pin.cgi, where the "wps_pin" parameter in POST requests to the binary is vulnerable to injection. This allows attackers to execute arbitrary operating system commands. The vulnerability carries a CVSS v3.1 base score of 9.8 (Critical), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility without authentication or user interaction.
Remote, unauthenticated attackers can exploit this vulnerability by crafting a malicious POST request to the apc_client_pin.cgi endpoint with a command injected into the wps_pin parameter. Successful exploitation grants full arbitrary command execution on the device, potentially leading to complete compromise, including data theft, persistence, or use as a pivot in further network attacks.
Advisories and additional details are available via the D-Link security bulletin at https://www.dlink.com/en/security-bulletin/ and a GitHub repository documenting the issue at https://github.com/IdaJea/IOT_vuln_1/blob/master/DIR825/wps_pin.md, which may include mitigation guidance or patch information.
Details
- CWE(s)