Overview
The following list of D-Link business/commerical WiFI Access Points all hardware revisions have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle. These products have been accused of multiple vulnerabilities.
- DAP-2310
- DAP-2330
- DAP-2360
- DAP-2553
- DAP-2660
- DAP-2690
- DAP-2695
- DAP-3320
- DAP-3662
The resources associated with these products have ceased their development and are no longer supported. For US consumers, D-Link Systems, Inc. (D-Link US), recommends retiring these products and replacing them with products that receive firmware updates. For non-US consumers, please contact your regional office for recommendations (LINK).
Please read information and recommendations below.
3rd Party Report information
- Reports provided:
Zheng Yaowen :: yaowen _dot_ zheng _at_ ntu _dot_ edu_dot_ sg :: Nanyang Technological University
- Details:
Public Disclosure Report: (Link will be Update at later time)
Please see table below for H/W Versions and F/W versions affected by the two exploits below
- Exploit 1 :: null pointer dereference vulnerability exists in the 'upload_certificate' function of sbin/httpd binary.When the binary handle the specific HTTP GET request, the strrchr in 'upload_certificate' function would take NULL as first argument, and incur the null pointer dereference vulnerability.
- Exploit 2 :: null pointer dereference vulnerability exists in the 'upload_config' function of sbin/httpd binary.When the binary handle the specific HTTP GET request, the content in upload_file variable is NULL in 'upload_config' function then the strncasecmp would take NULL as first argument, and incur the null pointer dereference vulnerability.
- Exploit 3 :: Null pointer dereference vulnerability exists in the sbin/httpd binary. The crash happens at ‘atoi’ operation when specific network package are sent to the httpd binary
Affected Models
|
|
|
Accused F/W for |
Accused F/W for |
|
|
Model |
Rev |
Region |
Exploit 1 & 2 |
Exploit 3
|
Latest F/W |
Last Updated |
DAP-2310 |
Bx |
US |
v2.07.RC031 |
2.10RC039 & Older |
3.00R048 |
08/24/2021 |
DAP-2330 |
Ax |
US |
v1.07.RC028 |
1.10RC036 BETA & Older |
1.10RC036 |
08/24/2021 |
DAP-2360 |
Bx |
US
|
v2.07.RC043 |
2.10RC055 & Older |
3.00RC064 |
08/24/2021 |
DAP-2553 |
Bx |
US
|
v3.06.RC027 |
3.10rc039 BETA & Older |
3.10rc039 BETA |
08/24/2021 |
DAP-2660 |
Ax |
US
|
v1.13.RC074 Hotfix |
1.15rc131b & Older |
2.00RC140 |
08/24/2021 |
DAP-2690 |
Bx |
US
|
v3.16.RC100 |
3.20RC115 BETA & Older |
3.20RC115 Beta |
08/24/2021 |
DAP-2695 |
Ax |
Worldwide |
v1.17.RC063 |
1.20RC093 & Older |
2.00R131 Hotfix |
08/24/2021 |
DAP-3320 |
Ax |
US
|
v1.01.RC014 |
1.05RC027 BETA & Older |
1.05RC027 BETA |
08/24/2021 |
DAP-3662 |
Ax |
US
|
v.1.01.RC022 |
1.05RC069 BETA & Older |
2.01RC098 |
08/24/2021 |
Recommendation for End of Support /End of Life Products
From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to evolution of technology, market demands, new innovations, product efficiencies based on new technologies, or the product matures over time and should be replaced by functionally superior technology.
For US Consumer
If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is normally no further extended support or development for it.
Typically for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support has ceased.
D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please make sure the device has the most recent firmware, make sure you frequently update the device's unique password to access its web-configuration, and always have WIFI encryption enabled with a unique password.