• Home Support Forums Security Advisories Shop     English | French
Support Announcement
DIR-813 & DIR-809 :: Unauthenticated Information Disclosure (CVE-2018-14080) & Credential Handled/Stored as Plain-Text (CVE-2018-14081)

On October 1, 2018, NIVEL4 research team publicly disclosed vulnerabilities that affect the DIR-809 Hardware Revision A1/A2, and DIR-813 Hardware Revision B1. This vulnerability allowed an unauthenticated user to download the devices configuration file from the ethernet LAN-side (in-home) side of the router which dicloses credentials and other information regarding the device.

 

3rd Party Report information

 

Original 3rd Party Disclosure

           (translation here)

 

CVE-ID Public Disclosures

  

Details

 

We advise you to read the Public Disclosure from the author.

 

There are two vulnerabilities: 

 

  • CVE-2018-14080: Incorrect Access Control / Authentication Bypass
  • CVE-2018-14081 :CWE-256: Unprotected Storage of Credentials / CWE-312: Cleartext Storage of Sensitive Information / Plain Text Storage of WPA Key and Router Password (for unencrypted file). 

   

Affected Products and Fixes:

 

Model Hardware Revision Affected FW Fixed FW  Last Updated
DIR-809 A1/A2  (non-US Models) v.1.09 and older (lower) v. 1.11B02_Beta 11/14/2018
DIR-813 B1 (US Model) v.1.09 and older (lower) v. 2.10B02_Beta 11/14/2018

 

 

Regarding Security patch for your D-Link Devices
 
Firmware updates address the security vulnerabilities in affected D-Link devices. D-Link will update this continually and we strongly recommend all users to install the relevant updates.
 
As there are different hardware revisions on our products, please check this on your device before downloading the correct corresponding firmware update. The hardware revision information can usually be found on the product label on the underside of the product next to the serial number. Alternatively, they can also be found on the device web configuration.