Support Announcements
D-Link Device Information for CVE-2021-45608 :: KCodes NetUSB RCE Vulnerability

Overview  

 

On January 11, 2020, a security researcher disclosed that potential security attacks could be performed against K-Codes' NetUSB kernel module when devices make it available over the internet.
 
In 2015, CVE-2015-3036 disclosure had found a vulnerability in KCodes NetUSB which is a Linux kernel module that enables several users on a local network to share USB-based services over IP.  After correcting the issues in D-Link products that supported KCodes, we phased-out the use of the software library. 

 

Since this time, most these devices have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle.  D-Link US recommends D-Link devices that have reached EOL/EOS, to be retired and replaced. Please contact your regional office for recommendations (LINK).


D-Link takes the issues of network security and user privacy very seriously. We have a dedicated task force and product management team on call to address evolving security issues and implement appropriate security measures. Please check this announcement for further updates regularly.

 

As a  general policy, when products reach EOS/EOL, they can no longer be supported, and all firmware development for these products cease.  Please read information and recommendations below.
 
 

3rd Party Report information

          

         CVE-2021-45608: https://nvd.nist.gov/vuln/detail/CVE-2021-45608
         Sentinel Labs:
https://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers/

 

Details : Reported 01/11/2022
 

         The flaw lies in NetUSB, a Linux kernel that lets printers and other devices gain local network access by plugging into a router's USB port. Apparently NetUSB listens for commands on both the local network and the Internet, making remote code execution possible.       

 

Affected Models

 

Model Region Hardware Revision End of Service Life
Legacy Website Last Updated
DIR-628 All Regions All A Revisions 9/1/2015 Yes (Link) 01/12/2022
DIR-632 All Regions All A Revisions 9/1/2015 Yes (Link) 01/12/2022
DIR-635 All Regions All B Revisions 11/1/2010 Yes (Link) 01/12/2022
DIR-655 All Regions All A & B Revisions 6/1/2018 Yes (Link) 01/12/2022
DIR-685 All Regions All A Revisions 5/5/2013 Yes (Link) 01/12/2022
DIR-825 All Regions All A & B Revisions 9/1/2015  Yes (Link) 01/12/2022
DIR-855 All Regions All A Revisions 7/1/2013 Yes (Link) 01/12/2022
DGL-4500 All Regions All A Revisions 5/5/2013 Yes (Link) 01/12/2022
DAP-1350 All Regions All A Revisions 3/1/2016  Yes (Link) 01/12/2022
DHP-1320 All Regions All A Revisions 5/1/2017  Yes (Link) 01/12/2022
DSL-3580L All Regions (Non-US) All A Revisions  7/6/2016  No (Non-US) 01/12/2022
DSL-2750B All Regions All T Revisions 7/15/2019  No (Non-US) 01/12/2022
DSL-2750B-US All Regions All T Revisions 7/15/2019  No (Project SKU) 01/12/2022
DSL-2750B-SG All Regions All T Revisions 7/15/2019   No (Project SKU) 01/12/2022
DSL-2750B All Regions (Non-US) All D Revisions  5/12/2020  No (Non-US) 01/12/2022
DSL-2751 All Regions (Non-US) All D Revisions  9/18/2019  No (Non-US) 01/12/2022
DSL-2770L All Regions (Non-US) All A Revisions 12/26/2013  No (Non-US) 01/13/2022

 

Recommendation for End of Support /End of Life Products

  
From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to evolution of technology, market demands,  new innovations, product efficiencies based on new technologies, or the product matures over time and should be replaced by functionally superior technology.

 

For US Consumer

  

If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is normally no further extended support or development for it.

 

Typically for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support has ceased. 

 

D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please make sure the device has the most recent firmware, make sure you frequently update the device's unique password to access its web-configuration, and always have WIFI encryption enabled with a unique password.