-----------------------------------------------------End-Of-Support (EOS) Product------------------------------------------------------------
This product has reached End-of Support(EOS) on Feburary 7, 2019. Products purchased in the US that have reached
END-OF-SUPPORT (EOS) or cannot be found using Search on this site (support.dlink.com) may have been moved to
our Legacy Products site (legacy.us.dlink.com). You can also click here to access our Legacy Products site:
D-Link LEGACY website. The resources associated with these products have ceased their development and are no
longer supported. D-Link Systems, Inc. recommends retiring these products and replacing them with products that
receive firmware updates.
-------------------------------------------------------------------------------------------------------------------------------------------------------------
Overview
On March 9, 2020, a 3rd party security researcher submitted a report accusing the DIR-619L (including DIR-619L-ES)
Hardware Revision C using firmware v2.06beta of two command excution security vulnearbilities from the LAN-side of
the device
The vulnerabilities were confirmed and a patch was issued too close the reported vulnerabilities. Please find the beta/hotfix release below
3rd Party Report information
- Report provided by ys110 :: yuanshuo360 _at_ 163 _dot_ com :: of 团队:360 ESG CodeSafe Team
- Link to 3rd Party Disclosure: To Be Updated
- Unauthorized Code Execution Vulnerability
When the router login interface enables graphical verification, the third parameter of the sprintf function in the
request /goform/Login, getAuthCode function is the FILECODE parameter,
which will copy the parameter to the local variable of the current function, causing a stack overflow and remote code execution.
- Authorized Code Execution Vulnerability
When requesting goform/Login authentication, webs
Redirect at the bottom of function formLogin, websRedirect passes sprintf ("<html> <head> </ head>, body.
This d") of the send_r_moved_perm function to copy the Request parameter curTime to Stack overflow
in local variables formLogin-> websRedirect-> send_r_moved_perm-> sprintf curTime parameter causes stack overflow
Affected Models
Model |
Hardware Revision |
Affected FW |
Fixed FW |
Recommendation |
Last Updated |
DIR-619L |
All Cx Hardware Revisions |
v2.06beta and Older
|
v2.06Beta_Patch |
Completed |
04/16/2020 |
Regarding Security patch for your D-Link Devices
Firmware updates address the security vulnerabilities in affected D-Link devices. D-Link will update this continually and we strongly recommend all users to install the relevant updates.
Please note that this is a device beta software, beta firmware, or hot-fix release which is still undergoing final testing before its official release. The beta software, beta firmware, or hot-fix is provided on an “as is” and “as available” basis and the user assumes all risk and liability for use thereof. D-Link does not provide any warranties, whether express or implied, as to the suitability or usability of the beta firmware. D-Link will not be liable for any loss, whether such loss is direct, indirect, special or consequential, suffered by any party as a result of their use of the beta firmware.
As there are different hardware revisions on our products, please check this on your device before downloading the correct corresponding firmware update. The hardware revision information can usually be found on the product label on the underside of the product next to the serial number. Alternatively, they can also be found on the device web configuration.