{"vulnerability": "cve-2024-0769", "sightings": [{"uuid": "fe11c15f-26f7-4d51-910e-1b615ae8fd8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3m4isuuuwad26", "content": "", "creation_timestamp": "2025-10-31T15:42:15.467246Z"}, {"uuid": "bcfdc765-17fc-4daf-af5d-fc5ffe7aff49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/c56c5ad8-2534-4703-8ec2-2b4f96df5c82", "content": "", "creation_timestamp": "2026-02-02T12:25:58.463044Z"}, {"uuid": "296a7632-deb7-4e67-995b-e6cab79fed7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/c56c5ad8-2534-4703-8ec2-2b4f96df5c82", "content": "", "creation_timestamp": "2026-02-02T12:25:58.463044Z"}, {"uuid": "ab8ca7b8-ccf1-4f2a-8b33-2894aa71aecf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "exploited", "source": "https://t.me/HackingInsights/4438", "content": "\u200aThreat actors actively exploit D-Link DIR-859 router flaw CVE-2024-0769\n\nhttps://securityaffairs.com/165045/hacking/d-link-dir-859-actively-exploited.html", "creation_timestamp": "2024-07-02T11:12:40.000000Z"}, {"uuid": "c5dd8818-ac82-48d5-a1f8-7f1d560a4267", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19523", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-0769\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It has been rated as critical. Affected by this issue is some unknown functionality of the file /hedwig.cgi of the component HTTP POST Request Handler. The manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251666 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.\n\ud83d\udccf Published: 2024-01-21T08:00:05.383Z\n\ud83d\udccf Modified: 2025-06-25T19:27:13.296Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.251666\n2. https://vuldb.com/?ctiid.251666\n3. https://github.com/c2dc/cve-reported/blob/main/CVE-2024-0769/CVE-2024-0769.md\n4. https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10371", "creation_timestamp": "2025-06-25T19:48:02.000000Z"}, {"uuid": "e99ed7ee-b31e-4f01-83ff-acbc5e7acaee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1901", "content": "https://github.com/c2dc/cve-reported/blob/main/CVE-2024-0769/CVE-2024-0769.md\nD-Link DIR-859\n#github #exploit", "creation_timestamp": "2024-01-25T16:56:00.000000Z"}, {"uuid": "bfe17b32-96ae-4e3c-a21c-9c79c8274619", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2575", "content": "#WLAN_Security\n#Mobile_Security\n1. Full Privilege Escalation vulnerability (CVE-2024-0769) in D-Link DIR-859 Wireless Router (Won\u2019t Fix)\nhttps://github.com/c2dc/cve-reported/blob/main/CVE-2024-0769/CVE-2024-0769.md\n2. Exploiting 0-click Android Bluetooth vulnerability to inject keystrokes without pairing\nhttps://www.mobile-hacker.com/2024/01/23/exploiting-0-click-android-bluetooth-vulnerability-to-inject-keystrokes-without-pairing", "creation_timestamp": "2024-08-16T09:02:41.000000Z"}, {"uuid": "4669aba8-883c-4996-a7be-db69057cd3d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lsjzkd7bbw27", "content": "", "creation_timestamp": "2025-06-26T21:02:26.565285Z"}, {"uuid": "e6deb22d-690d-41e1-8fc0-3eb6b7a3c836", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lskbwyrqys2j", "content": "", "creation_timestamp": "2025-06-26T23:32:36.883243Z"}, {"uuid": "fa7f2a6f-19f9-4888-883c-8914b0d2774a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3lsjem5gdwk2h", "content": "", "creation_timestamp": "2025-06-26T14:47:37.776046Z"}, {"uuid": "28240b19-ecb0-4ff2-b16b-c774bc8f4590", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-28T08:23:31.000000Z"}, {"uuid": "030d7beb-d089-43d1-8f0e-88dda9d36d75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "exploited", "source": "https://t.me/cKure/13215", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 Threat actors actively exploit D-Link DIR-859 router flaw CVE-2024-0769.\n\nhttps://securityaffairs.com/165045/hacking/d-link-dir-859-actively-exploited.html", "creation_timestamp": "2024-07-01T16:27:32.000000Z"}, {"uuid": "cae65142-b0c9-4b4e-a5dc-47b3ca236284", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "exploited", "source": "https://t.me/HackingInsights/4203", "content": "Threat actors actively exploit D-Link DIR-859 router flaw CVE-2024-0769\nhttps://ift.tt/oGiYa34", "creation_timestamp": "2024-07-01T12:28:07.000000Z"}, {"uuid": "94718d8f-c122-4eff-a683-9f0a217b3748", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lstapzgouc2m", "content": "", "creation_timestamp": "2025-06-30T13:04:48.655744Z"}, {"uuid": "7dee58a1-754e-4c85-bcb0-b880bbf989d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/4289349", "content": "", "creation_timestamp": "2025-06-25T17:24:14.111598Z"}, {"uuid": "5c48ec67-1e4e-4c20-a5e3-427dbf422651", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lshfuhub222e", "content": "", "creation_timestamp": "2025-06-25T20:04:47.582282Z"}, {"uuid": "572ad180-c859-46a4-847f-79b9154ec1ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lshhttbnxm24", "content": "", "creation_timestamp": "2025-06-25T20:40:12.687108Z"}, {"uuid": "8368127b-ab52-41ec-aad6-256d88735ce3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lss4ycd7ki26", "content": "", "creation_timestamp": "2025-06-30T02:25:09.305265Z"}, {"uuid": "410daefb-1263-45b2-80d3-05e619d70b99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lssacvuw7s2f", "content": "", "creation_timestamp": "2025-06-30T03:24:51.940903Z"}, {"uuid": "9c3b2fe0-7403-4275-8ce1-182e3b4d3919", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lsj4uk3mxgc2", "content": "", "creation_timestamp": "2025-06-26T12:29:33.716063Z"}, {"uuid": "18a82c74-7b38-4743-adc2-5cd74075480c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-29T03:12:14.000000Z"}, {"uuid": "bd9b7c97-7f3f-4ce5-80bb-bc370d47b9e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "published-proof-of-concept", "source": "Telegram/i_4AjZwocVr_2oz9hkri-mMNNEfv4C3mMOeuU0ZCbm8pSQ", "content": "", "creation_timestamp": "2024-01-25T16:56:50.000000Z"}, {"uuid": "6bfd1ad8-47de-46fc-bb00-7b59ce75aa5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "published-proof-of-concept", "source": "Telegram/Tji5NpDbblQEOI6yVVFQ9meH0bSNG5HxeZbwcfI1ZNS3OA", "content": "", "creation_timestamp": "2024-01-25T16:56:39.000000Z"}, {"uuid": "2503ee62-8791-4297-b94f-338bb2032c0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "exploited", "source": "https://t.me/ctinow/219535", "content": "Threat actors actively exploit D-Link DIR-859 router flaw CVE-2024-0769\nhttps://ift.tt/oGiYa34", "creation_timestamp": "2024-07-01T09:44:36.000000Z"}, {"uuid": "9d9bdec3-4c67-4569-a7bd-53a3cd566a31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "https://t.me/ctinow/170778", "content": "https://ift.tt/YBOduoE\nCVE-2024-0769", "creation_timestamp": "2024-01-21T09:21:21.000000Z"}, {"uuid": "725473dd-16fe-4a7d-8281-fb1834d2de72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "https://t.me/ctinow/170736", "content": "https://ift.tt/XNPfWwA\nCVE-2024-0769 | D-Link DIR-859 1.06B01 HTTP POST Request /hedwig.cgi service path traversal", "creation_timestamp": "2024-01-20T22:51:18.000000Z"}, {"uuid": "9a6420b7-316b-4368-a236-2326cb562427", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "exploited", "source": "https://t.me/xakep_ru/16036", "content": "\u0425\u0430\u043a\u0435\u0440\u044b \u0432\u0437\u043b\u0430\u043c\u044b\u0432\u0430\u044e\u0442 \u0440\u043e\u0443\u0442\u0435\u0440\u044b D-Link DIR-859 \u0440\u0430\u0434\u0438 \u043a\u0440\u0430\u0436\u0438 \u043f\u0430\u0440\u043e\u043b\u0435\u0439\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0443\u044e Wi-Fi \u0440\u043e\u0443\u0442\u0435\u0440\u044b D-Link DIR-859, \u0434\u043b\u044f \u0441\u0431\u043e\u0440\u0430 \u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043f\u0430\u0440\u043e\u043b\u0438.\n\nhttps://xakep.ru/2024/07/01/cve-2024-0769/", "creation_timestamp": "2024-07-01T12:38:38.000000Z"}, {"uuid": "6959eb38-47c3-44b4-aaea-85acbc0f6c9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9851", "content": "#WLAN_Security\n#Mobile_Security\n1. Full Privilege Escalation vulnerability (CVE-2024-0769) in D-Link DIR-859 Wireless Router (Won\u2019t Fix)\nhttps://github.com/c2dc/cve-reported/blob/main/CVE-2024-0769/CVE-2024-0769.md\n2. Exploiting 0-click Android Bluetooth vulnerability to inject keystrokes without pairing\nhttps://www.mobile-hacker.com/2024/01/23/exploiting-0-click-android-bluetooth-vulnerability-to-inject-keystrokes-without-pairing", "creation_timestamp": "2024-01-25T19:40:17.000000Z"}, {"uuid": "0a663d21-0640-4557-968d-141fc4913973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0769", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lsrka2wx7c2c", "content": "", "creation_timestamp": "2025-06-29T20:49:29.268695Z"}]}