Overview
The DCS-930L / DCS-931L / DCS-932L / DCS-933L / DCS-934L / DCS-935L / DCS-936L / DCS-940L / DCS-942L / DCS-960L / (non-US) DCS-5000L, all H/W Revs all hardware revisions have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle. These products have been accused of multiple vulnerabilities.
The resources associated with these products have ceased their development and are no longer supported. For US consumers, D-Link Systems, Inc. (D-Link US), recommends retiring these products and replacing them with products that receive firmware updates. For non-US consumers, please contact your regional office for recommendations (LINK).
Please read information and recommendations below.
3rd Party Report information
- Reports provided (09/03/21):
Hristo Georgiev :: hristog _at_ kth _dot_ se
Azad Mustafa :: azadm _at_ kth.se
- Details:
Public Disclosure Report: DCS-932L & (non-US) DCS-5000L
- Exploit 1 :: The use of the basic authentication for the devices command interface allows attack vectors that may compromise the cameras configuration and allow malicious users on the LAN to access the device. The last know firmware for the devices do enable digest-authentication to help mitigate this issue. Please see exploit 2 for digest-authenication vulnerability.
- Exploit 2 :: the use of the digest-authentication for the devices command interface may allow further attack vectors that may compromise the cameras configuration and allow malicious users on the LAN to access the device.
In order to mitigate these issues the device would need to support https. The DCS-932L ended sales in the US on May 1, 2019. The DCS-932L no longer is supported and development has ceased. D-Link recommends retiring and replacing these cameras with supported devices. The DCS-5000L was not sold in the US, and D-Link Corporation has End-of-Life the product, you should contact your regional D-Link support for their suggestions. Please see recommendation below for further details.
- Reports provided (05/29/24): Chuan Qin :: qinchuan _at_ iie _dot_ ac _dot_ cn
- Exploint 4: DCS-932L (
Link) Stack-Overflow can elevate into DDoS
Affected Models
Model |
Rev |
Region |
Accused firmware
|
EOL/EOS |
Status |
Recommendation |
Last Updated |
DCS-930L |
All |
Worldwide |
None Known |
10/31/18 |
Legacy(Link) |
Retire and Replace |
05/29/2024 |
DCS-931L |
All |
Worldwide |
None Known |
07/01/18
|
Legacy(Link) |
Retire and Replace |
05/29/2024 |
DCS-932L |
All |
Worldwide |
v2.18 and Older |
05/01/19 |
Legacy(Link) |
Retire and Replace |
05/29/2024 |
DCS-933L |
All |
Worldwide |
None Known |
01/31/20 |
Legacy(Link) |
Retire and Replace |
05/29/2024 |
DCS-934L |
All |
Worldwide |
None Known |
07/01/18 |
Legacy(Link) |
Retire and Replace |
05/29/2024 |
DCS-935L |
All |
Worldwide |
None Known |
03/31/20 |
Legacy(Link) |
Retire and Replace |
05/29/2024 |
DCS-936L |
All |
Worldwide |
None Known |
08/19/19 |
Legacy(Link) |
Retire and Replace |
05/29/2024 |
DCS-940L |
All |
Worldwide |
None Known |
09/1/15 |
Legacy(Link) |
Retire and Replace |
05/29/2024 |
DCS-942L |
All |
Worldwide |
None Known |
07/01/18 |
Legacy(Link) |
Retire and Replace |
05/29/2024 |
DCS-960L |
All |
Worldwide |
None Known |
06/01/19 |
Legacy(Link) |
Retire and Replace |
05/29/2024 |
DCS-5000L |
All |
Worldwide |
v1.05 |
11/29/23 |
(non-US) None |
Contact Regional Office |
09/03/2021 |
Recommendation for End-of-Support/End-of-Life Products
From time to time, D-Link will decide that some of its products have reached the End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to technological evolution, market demands, new innovations, product efficiencies based on new technologies, or the product maturing over time and should be replaced by functionally superior technology.
For US Consumer
If a product has reached the End of Support ("EOS") / End of Life ("EOL"), it usually does not receive further extended support or development.
Typically, D-Link cannot resolve device or firmware issues for these products since all development and customer support have ceased.
D-Link strongly advises against the use of end-of-support products, as their continued use may pose significant risks to the devices connected to them. If US consumers choose to disregard this advice, it is crucial to ensure the device has the most recent firmware, frequently update the device's unique password for web-configuration access, and always enable WIFI encryption with a unique password.
Regarding the Security Update for Your D-Link Device
Installing firmware updates is a critical step in addressing security vulnerabilities in your D-Link devices. D-Link strongly urges all users to install the relevant updates and regularly check for further updates. After downloading the firmware update, it is essential to ALWAYS validate its success by comparing the firmware version on your product interface to the firmware update version.
Please note that beta software, beta firmware, or a hot-fix release is still undergoing rigorous testing before its official release. This ensures that the software is of the highest quality and meets our stringent standards. However, it is essential to understand that the user assumes all risk and liability for its use. D-Link does not provide any express or implied warranties regarding the suitability or usability of the beta software, beta firmware, or hot-fix release. D-Link will not be liable for any direct, indirect, special, or consequential loss suffered by any party due to their use of the beta firmware, beta software, or hit-fix release.
NOTE: Our products have different hardware revisions, so please check your device’s hardware revision before downloading the corresponding firmware update. The hardware revision can be found on the product label next to the serial number or on the device's web interface.