mastodonien.de

nerdculture.de

Zeitpunkt              Nutzer    Delta   Tröts        TNR     Titel                     Version  maxTL
Mi 03.07.2024 00:02:06     7.218      +2      596.470    82,6 NerdCulture               4.2.9      500
Di 02.07.2024 00:01:46     7.216       0      596.034    82,6 NerdCulture               4.2.9      500
Mo 01.07.2024 00:01:27     7.216       0      595.653    82,5 NerdCulture               4.2.9      500
So 30.06.2024 00:01:08     7.216       0      595.129    82,5 NerdCulture               4.2.9      500
Sa 29.06.2024 00:01:19     7.216       0      594.555    82,4 NerdCulture               4.2.9      500
Fr 28.06.2024 00:01:14     7.216       0      602.563    83,5 NerdCulture               4.2.9      500
Do 27.06.2024 00:01:15     7.216      +1      602.291    83,5 NerdCulture               4.2.9      500
Mi 26.06.2024 00:01:08     7.215      +1      601.689    83,4 NerdCulture               4.2.9      500
Di 25.06.2024 00:00:03     7.214       0      601.279    83,3 NerdCulture               4.2.9      500
Mo 24.06.2024 00:00:12     7.214       0      600.804    83,3 NerdCulture               4.2.9      500

Mi 03.07.2024 14:11

Critical D-Link DIR-859 Router Flaw to steal Passwords.

The security issue was disclosed in January and is currently tracked as CVE-2024-0769 (9.8 severity score).
D-Link is not expected to release a fixing patch for CVE-2024-0769, so owners of the device should switch to a supported device as soon as possible.

labs.greynoise.io/grimoire/202

Although D-Link DIR-859 WiFi router model reached end-of-life (EoL) and no longer receives any updates, the vendor still released a security advisory explaining that the flaw exists in the

Although D-Link DIR-859 WiFi router model reached end-of-life (EoL) and no longer receives any updates, the vendor still released a security advisory explaining that the flaw exists in the "fatlady.php" file of the device, affects all firmware versions, and allows attackers to leak session data, achieve privilege escalation and gain full control via the admin panel.

Contents of the retrieved configuration file
[ImageSource: GreyNoise]

The researchers explain that threat actors are targeting the 'DEVICE.ACCOUNT.xml' file to dump all account names, passwords, user groups and user descriptions present on the device.

Contents of the retrieved configuration file [ImageSource: GreyNoise] The researchers explain that threat actors are targeting the 'DEVICE.ACCOUNT.xml' file to dump all account names, passwords, user groups and user descriptions present on the device.

Malicious POST request
[ImageSource: GreyNoise]

The attack leverages a malicious POST request to '/hedwig.cgi,' exploiting CVE-2024-0769 to access sensitive configuration files ('getcfg') via the 'fatlady.php' file, which potentially contains user credentials.

Malicious POST request [ImageSource: GreyNoise] The attack leverages a malicious POST request to '/hedwig.cgi,' exploiting CVE-2024-0769 to access sensitive configuration files ('getcfg') via the 'fatlady.php' file, which potentially contains user credentials.

[Öffentlich] Antw.: 0 Wtrl.: 0 Fav.: 0 · via Metatext

Antw. · Weiterl. · Fav. · Lesez. · Pin · Stumm · Löschen