Support Announcements
DIR-619L :: Rev. B :: FW v2.06beta :: unauthorized & authroized code execution security vulnerabilities

-----------------------------------------------------End-Of-Support (EOS) Product------------------------------------------------------------

This product has reached End-of Support(EOS) on Feburary 7, 2019. Products purchased in the US that have reached

END-OF-SUPPORT (EOS) or cannot be found using Search on this site (support.dlink.com) may have been moved to

our Legacy Products site (legacy.us.dlink.com). You can also click here to access our Legacy Products site:

D-Link LEGACY website. The resources associated with these products have ceased their development and are no

longer supported.  D-Link Systems, Inc. recommends retiring these products and replacing them with products that

receive firmware updates.

-------------------------------------------------------------------------------------------------------------------------------------------------------------

 

Overview

On March 9, 2020, a 3rd party security researcher  submitted a report accusing the DIR-619L (including DIR-619L-ES)

Hardware Revision C using firmware v2.06beta of two command excution security vulnearbilities from the LAN-side of

the device  

 

The vulnerabilities were confirmed and a patch was issued too close the reported vulnerabilities.  Please find the beta/hotfix release below


3rd Party Report information


          - Report provided by ys110 :: yuanshuo360 _at_ 163 _dot_ com ::  of  团队:360 ESG CodeSafe Team

                  - Link to 3rd Party Disclosure: To Be Updated

 

          - Unauthorized Code Execution Vulnerability
              When the router login interface enables graphical verification, the third parameter of the sprintf function in  the

              request /goform/Login, getAuthCode function is the FILECODE  parameter,

              which will copy the parameter to the local variable of the current function, causing a stack overflow and remote code execution.
 
          - Authorized Code Execution Vulnerability
             When requesting goform/Login authentication, webs

             Redirect at the bottom of function formLogin, websRedirect passes sprintf ("<html> <head> </ head>, body. 

             This d") of the send_r_moved_perm function to copy the Request parameter curTime  to Stack overflow

             in local variables formLogin-> websRedirect-> send_r_moved_perm-> sprintf  curTime parameter causes stack overflow

 

Affected Models

 

Model Hardware Revision Affected FW Fixed FW Recommendation  Last Updated
DIR-619L All Cx Hardware Revisions v2.06beta and Older
v2.06Beta_Patch Completed 04/16/2020

  

Regarding Security patch for your D-Link Devices
 
Firmware updates address the security vulnerabilities in affected D-Link devices. D-Link will update this continually and we strongly recommend all users to install the relevant updates.
 
Please note that this is a device beta software, beta firmware, or hot-fix release which is still undergoing final testing before its official release. The beta software, beta firmware, or hot-fix is provided on an “as is” and “as available” basis and the user assumes all risk and liability for use thereof. D-Link does not provide any warranties, whether express or implied, as to the suitability or usability of the beta firmware. D-Link will not be liable for any loss, whether such loss is direct, indirect, special or consequential, suffered by any party as a result of their use of the beta firmware.
 
As there are different hardware revisions on our products, please check this on your device before downloading the correct corresponding firmware update. The hardware revision information can usually be found on the product label on the underside of the product next to the serial number. Alternatively, they can also be found on the device web configuration.