Support Announcements
(EOL/EOS) Business DAP Access Models ::: End of Support / End of Life Product :: Multiple Security Vulnerabilities

 

Overview  

 

The following list of D-Link business/commerical WiFI Access Points all hardware revisions have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle.  These products have been accused of multiple vulnerabilities.

 

     - DAP-2310
     - DAP-2330
     - DAP-2360
     - DAP-2553
     - DAP-2660
     - DAP-2690
     - DAP-2695
     - DAP-3320
     - DAP-3662


The resources associated with these products have ceased their development and are no longer supported. For US consumers, D-Link Systems, Inc. (D-Link US), recommends retiring these products and replacing them with products that receive firmware updates. For non-US consumers, please contact your regional office for recommendations (LINK). 

 

Please read information and recommendations below.
 

3rd Party Report information

   
    - Reports provided: 

 

        Zheng Yaowen :: yaowen _dot_ zheng _at_ ntu _dot_ edu_dot_ sg :: Nanyang Technological University

  

   - Details:

 

                Public Disclosure Report: (Link will be Update at later time)

 

                Please see table below for H/W Versions and F/W versions affected by the two exploits below

 

           - Exploit 1 :: null pointer dereference vulnerability exists in the 'upload_certificate' function of sbin/httpd binary.When the binary handle the specific HTTP GET request, the strrchr in 'upload_certificate' function  would take NULL as first argument, and incur the null pointer dereference vulnerability.

 

        - Exploit 2 :: null pointer dereference vulnerability exists in the 'upload_config' function of sbin/httpd binary.When the binary handle the specific HTTP GET request, the content in upload_file variable is NULL in 'upload_config' function then the strncasecmp would take NULL as first argument, and incur the null pointer dereference vulnerability.

 

        - Exploit 3 :: Null pointer dereference vulnerability exists in the sbin/httpd binary. The crash happens at ‘atoi’ operation when specific network package are sent to the httpd binary

 

Affected Models

 

      Accused F/W for Accused F/W for    
Model Rev Region Exploit 1 & 2 Exploit 3
Latest F/W  Last Updated
DAP-2310 Bx US v2.07.RC031 2.10RC039 & Older 3.00R048 08/24/2021
DAP-2330 Ax US v1.07.RC028 1.10RC036 BETA & Older 1.10RC036 08/24/2021
DAP-2360 Bx US
v2.07.RC043 2.10RC055 & Older 3.00RC064 08/24/2021
DAP-2553 Bx US
v3.06.RC027 3.10rc039 BETA & Older 3.10rc039 BETA 08/24/2021
DAP-2660 Ax US
v1.13.RC074 Hotfix 1.15rc131b & Older 2.00RC140 08/24/2021
DAP-2690 Bx US
v3.16.RC100 3.20RC115 BETA & Older 3.20RC115 Beta 08/24/2021
DAP-2695 Ax Worldwide v1.17.RC063 1.20RC093 & Older 2.00R131 Hotfix 08/24/2021
DAP-3320 Ax US
v1.01.RC014 1.05RC027 BETA & Older  1.05RC027 BETA 08/24/2021
DAP-3662 Ax US
v.1.01.RC022 1.05RC069 BETA & Older 2.01RC098 08/24/2021

  


Recommendation for End of Support /End of Life Products

 

  
From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to evolution of technology, market demands,  new innovations, product efficiencies based on new technologies, or the product matures over time and should be replaced by functionally superior technology.

 

For US Consumer  

   
If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is normally no further extended support or development for it.

 

Typically for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support has ceased. 

 

D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please make sure the device has the most recent firmware, make sure you frequently update the device's unique password to access its web-configuration, and always have WIFI encryption enabled with a unique password.