Support Announcements
DAP-2553 :: Rev. Ax :: All Firmware Versions :: End of Support / End of Life Product :: Reported Vulnerability



The DAP-2553 hardware revision Ax WiFi access point is a legacy device which listed below in the table. The hardware revision Ax (x is 0 to 9), has reached its End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle.  D-Link US recommends D-Link devices that have reached EOL/EOS, to be retired and replaced. Please contact your regional office for recommendations (LINK). 


As a  general policy, when products reach EOS/EOL, they can no longer be supported, and all firmware development for this product has ceased.  Please read information and recommendations below.

3rd Party Report information


Details : Reported 07/08/2021

            063751768 _at_ gg _dot_ com

                 A command injection vulnerability in D-Link DAP-2553 REVA 1.32 and earlier. The detail is as following:
                Authenticated remote attackers can execute arbitrary OS commands via the parameter 'exeshell' in a HTTP GET request.


Accused Model


Model Region Hardware Revision End of Service Life
Fixed Firmware Legacy Website Last Updated
DAP-2553 All Regions All A Revisions 01/08/18 EoL/EoS Yes (Link)


Recommendation for End of Support /End of Life Products

From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to evolution of technology, market demands,  new innovations, product efficiencies based on new technologies, or the product matures over time and should be replaced by functionally superior technology.


For US Consumer


If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is normally no further extended support or development for it.


Typically for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support has ceased. 


D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please make sure the device has the most recent firmware, make sure you frequently update the device's unique password to access its web-configuration, and always have WIFI encryption enabled with a unique password.