CVE-2024-11068

D-Link DSL6740C - Incorrect Use of Privileged APIs

Description

The D-Link DSL6740C modem has an Incorrect Use of Privileged APIs vulnerability, allowing unauthenticated remote attackers to modify any user’s password by leveraging the API, thereby granting access to Web, SSH, and Telnet services using that user’s account.

Remediation

Solution:

  • The affected devices are no longer supported for updates. It is recommended to replace the devices.

Category

9.8
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 0.24%
Third-Party Advisory org.tw Third-Party Advisory org.tw
Affected: D-Link DSL6740C
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-11068?
CVE-2024-11068 has been scored as a critical severity vulnerability.
How to fix CVE-2024-11068?
To fix CVE-2024-11068: The affected devices are no longer supported for updates. It is recommended to replace the devices.
Is CVE-2024-11068 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-11068 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-11068?
CVE-2024-11068 affects D-Link DSL6740C.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.