• Home Support Forums Security Advisories Shop     English | French
Support Announcement
DAP-2660 :: H/W Rev. Ax :: F/W v1.13 :: All Models :; All Revisions :: End-of-Life / End-of-Service-Life :: CVE-2023-39749 / CVE-2023-39750 :: buffer overflow vulnerabilities

Overview  

 On August 21, 2023, a D-Link was made aware of two security report,  CVE-2023-39749 / CVE-2023-39750.  These disclosure reports are for the DAP-2660 hardware revision Ax, firmware version v1.13. The vulnerability is device software, that can allow a malicious users to trigger a buffer overflow exploit that will cause the system to halt function.

  

This exploit affects a legacy D-Link router and all hardware revisions, which have reached their End of Life ("EOL")/End of Service Life ("EOS") Cycle in the US in 2022, and will be EOL/EOS globally on 6/30/2024.  Products that have reached their EOL/EOS no longer receive device software updates and security patches and are no longer supported by D-Link. Details can be found on here:(LINK).

 

A fix for this issue is below, however, this is offered to owners to use at their own decision. Again, in the US, D-Link recommends immediate retire and replace for these legacy generation devices.


D-Link US recommends that D-Link devices that have reached EOL/EOS be retired and replaced. ; Outside the US we would encourage you to find more information from the regional source here: (LINK)

Regardless of product type or sales channel, D-Link's general policy is that when products reach EOS/EOL, they can no longer be supported, and all firmware development for these products ceases. Please read the information and recommendations below.

3rd Party Report information

   
    - Report provided:

        - CVE-2023-39749
          D-Link DAP-2660 v1.13 was discovered to contain a buffer overflow via the component /adv_resource. This vulnerability is exploited via a crafted GET request.

        - CVE-2023-39750
          D-Link DAP-2660 v1.13 was discovered to contain a buffer overflow via the f_ipv6_enable parameter at /bsc_ipv6. This vulnerability is exploited via a crafted POST request.

 

Affected Models

 Model

Region

Hardware Revision

End of Service Life

Fixed Firmware

Recommendation

Last Updated

DAP-2660

US / Non-US

All H/W Revisions

12/31/2022 / 06/30/2024

 v2.00b05r148

Retire & Replace Device

 09/22/2023

 

Recommendation for End-of-Support/End-of-Life Products

From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL an effect due to the evolution of technology, market demands, innovations, and product efficiencies based on new technologies, or the product matures over time and should be replaced by functionally superior technology.

 

For US Consumer  

If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is usually no further extended support or development for it.

Typically, for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support has ceased. 

 

D-Link US is prohibited from supporting these EOL/EOS products; if you are outside the US, please get in touch with your regional D-Link office. If your device was provided by a licensed carrier (service provider) and firmware, o get in touch with don’t hesitate to contact your carrier (service provider). Many devices on this list have available 3rd party open-firmware, D-Link does not support open-firmware, which voids any warranty and is solely the responsibility of the device's owner.

 

D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please make sure the device has the last know firmware which can be located on the Legacy Website links above. Please make sure you frequently update the device's unique password to access its web-configuration, and always have WIFI encryption enabled with a unique password.