• Home Support Forums Security Advisories Shop     English | French
Support Announcement
DNS-320 :: Rev. Ax :: FW v2.05b01Beta :: CVE-2020-25506 :: End of Service Life (No Fixes Offered) :: Reported Vulnerability

Overview
 
On July 7, 2020, D-Link was made aware of a Command Injection Vulnerability report by Swing of Chaitin Security Research Lab affecting the D-Link Network Attached Storage (NAS): DNS-320 Revison Ax. This disclosures is referenced as CVE-2020-25506

 

All US consumers using the DNS-320 hardware revision Ax, are recommended to immediately retire and replace the device.

 

The DNS-320 Rev. Ax reached its End-of-Support Date in 2018 in the US , it is no longer supported, and firmware development has ceased, further recommendations below

Report

     Weiming Shi :: Swing of Chaitin Security Research Lab :: weiming.shi _at_ chaitin _dot_ com

 

      CVE-2020-25506:: Link
 
      Public Disclosure: https://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675

 

Affected Models

 

 Model

H/W Version

Latest F/W Version

Actions to take

DNS-320

Ax

2.06b01Beta

Disable the Internet connection to NAS (See Below)

 

Recommendation for End of Service Life Products

 

While D-Link is aware of the alleged vulnerabilities involving the DNS-320. These products have reached End of Life(EoL)/End of Support(EoS), and there is no extended support or development for them.

 

D-Link will be unable to resolve Device or Firmware issues since all development and customer support has ceased. 

 

From time to time, D-Link will decide that sure of its products have reached EOL. D-Link may choose to EoL a product for many reasons, including the shift in market demands, technology innovation, costs or efficiencies based on new technologies, or the product matures over time and is replaced by functionally superior technology.

 

For US consumers,for EOL/EOS products the recommendation D-Link brand products sold by D-Link in the US be retired, and any further use may be a risk to devices connected to it and end-users connected to it. If US consumers continue to use these products against D-Link's recommendation, please make sure the device has the most recent firmware from https://legacy.us.dlink.com/, installed, make sure you frequently update the device's unique password to access its web-configuration and always have WiFI encryption enabled with a unique password.