• Home Support Forums Security Advisories Shop     English | French
Support Announcement
DAP-1513 / DIR-601 / DIR-825 :: All Revisions :: All Firmware Versions :: End-of-Life (EOL) / End-of-Service (EOS) :: Multiple Vulnerabilities Reported

Overview  

 

The D-Link DAP-1513 WiFi Access Points / DIR-601 WiFi Routers / DIR-825 WiFi Routers., all hardware revisions, are legacy devices as listed below in the table. All hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-CycleD-Link US recommends D-Link devices that have reached EOL/EOS, to be retired and replaced. Please contact your regional office for recommendations (LINK). 

 

As a  general policy, when products reach EOS/EOL, they can no longer be supported, and all firmware development for these products cease.  Please read information and recommendations below.
 
 

3rd Party Report information

 

Details : Reported 11/01/2022
 

3rd Party: Arizona State University, Laboratory of Security Engineering for Future Computing  (SEFCOM)

                     Hui Jun Tay :: hui _dot_ jun_dot_ tay _at_ gmail _dot_ com

                     Kyle Zeng :: zengyhkyle _at_ asu _dot_ edu

                     Jayakrishna Vadayath :: jvadayat _at_ asu _dot_ edu

 

                    DAP-1513 (REVA FIRMWARE V1.01) reference: /bin/webs
                    - Cause: Buffer overflow at memcpy() in process_request()

 

                    DIR-601 (REVA FIRMWARE V1.02) reference: /sbin/httpd

                    - Cause: Stack overflow leading to pointer overwrite. Overflow is due to multiple calls to sprintf()

                    - Cause: Signedness bug leads to stack overflow in get_pure_content()

                    - Cause: strcat() in do_ej() leading to stack overflow

                    - Cause: strcat() in do_file() leading to stack overflow

                    - Cause: Heap overflow leading to crash inside fgets()

                    - Cause: NULL dereference as return value of strchr() is not checked

                    - Cause: Heap overflow leading to crash inside ioctl()

 

                     DIR-825 (REVB FIRMWARE V2.03) reference: In /sbin/httpd

                    - Cause: strcat() in do_file() leading to stack overflow

                    - Cause: Heap overflow leading to crash inside fgets()

                    - Cause: NULL dereference as return value of strchr() is not checked

                    - Cause: Heap overflow leading to crash inside ioctl()

                    - Cause: Signedness bug leads to stack overflow in get_pure_content()

                    - Cause: strcat() in do_ej() leading to stack overflow

 

Accused Model

 

Model Region Hardware Revision End of Service Life
Fixed Firmware Legacy Website Last Updated
DAP-1513 All Regions All H/W Revisions 01/31/2018 Not Available
Yes (Link)
11/04/2022
DIR-601 All Regions All H/W Revisions 12/30/2017 Not Available Yes (Link) 11/04/2022
DIR-825 All Regions All H/W Revisions 09/01/2015 Not Available Yes (Link) 11/04/2022

 

Recommendation for End of Support /End of Life Products

  
From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to evolution of technology, market demands,  new innovations, product efficiencies based on new technologies, or the product matures over time and should be replaced by functionally superior technology.

 

For US Consumer

  

If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is normally no further extended support or development for it.

 

Typically for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support has ceased. 

 

D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please make sure the device has the most recent firmware, make sure you frequently update the device's unique password to access its web-configuration, and always have WIFI encryption enabled with a unique password.