• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10232
DAP-2555 : H/W Rev. Ax : F/W v1.20 : ::: End of Support / End of Life Product :: Reported Vulnerabilities
Publication ID: SAP10232
Resolved Status: Yes
Published on: 10 August 2021 10:13 GMT
Last updated on: 29 May 2024 4:37 GMT

 

Overview

 

The DAP-2555, all A series hardware revisions have reached End of Life ("EOL") /End of Service Life ("EOS") of there Life-Cycles in 2019.  D-Link US recommends D-Link devices that have reached EOL/EOS, should be retired and replaced. Please contact your regional office for recommendations (LINK).


As a  general policy, when products reach EOS/EOL, they can no longer be supported, and all firmware development for the products ceases.  Please read information and recommendations below.

 

3rd Party Report information

    - Reports provided: 
-
1063751768 :: robertjames _at_ qq _dot_ com

 

   - Exploit 1: Stored XSS

 

This vulnerability exists in the web interface "/bsc_lan.php". Authenticated remote attackers can trigger this vulnerability by modifying parameters 'ipaddr', 'gateway' and 'ipmask' via a HTTP request. The payload is like "</script><script>alert('XSS');</script><script>" or "#getURL("javascript:alert(\'XSS\')")"

 

   - Exploit 2: Stored XSS

 

This vulnerability exists in the web interface "/adv_dhcpd.php". Authenticated remote attackers can trigger this vulnerability by modifying the parameter 'f_endip' in a HTTP request. The payload is like "</script><script>alert('XSS');</script><script>".

 

    - Exploit 3: Command Injection

 

This vulnerability exists in the web interface "/adv_dhcpl.xgi?=&exeshell=submit%20DHCP_COMPARE". Authenticated remote attackers can execute arbitrary OS commands by modifying the value of 'exeshell'  in a HTTP request. The payload is like "exeshell=/index.html|/test|" or "submit%20DHCP_COMPARE;/test".

 
    - Reports provided:  - Chuan Qin ::  qinchuan _at_ iie _dot_ ac _dot_ cn
 
       - Exploint 4: (Link) Stack-Overflow can elevate into DDoS
 
 

Affected Models

 

Model Region Hardware Revision End of Support Legacy Website Last Updated
DAP-2555 Worldwide
Ax Series H/W Revisions
2019 YES 05/29/2024

 

Recommendation for End-of-Support/End-of-Life Products

  

From time to time, D-Link will decide that some of its products have reached the End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to technological evolution, market demands, new innovations, product efficiencies based on new technologies, or the product maturing over time and should be replaced by functionally superior technology.

 

For US Consumer

 

If a product has reached the End of Support ("EOS") / End of Life ("EOL"), it usually does not receive further extended support or development. 

Typically, D-Link cannot resolve device or firmware issues for these products since all development and customer support have ceased.

 

D-Link strongly advises against the use of end-of-support products, as their continued use may pose significant risks to the devices connected to them. If US consumers choose to disregard this advice, it is crucial to ensure the device has the most recent firmware, frequently update the device's unique password for web-configuration access, and always enable WIFI encryption with a unique password.

 

Regarding the Security Update for Your D-Link Device

 

Installing firmware updates is a critical step in addressing security vulnerabilities in your D-Link devices. D-Link strongly urges all users to install the relevant updates and regularly check for further updates. After downloading the firmware update, it is essential to ALWAYS validate its success by comparing the firmware version on your product interface to the firmware update version.

 

Please note that beta software, beta firmware, or a hot-fix release is still undergoing rigorous testing before its official release. This ensures that the software is of the highest quality and meets our stringent standards. However, it is essential to understand that the user assumes all risk and liability for its use. D-Link does not provide any express or implied warranties regarding the suitability or usability of the beta software, beta firmware, or hot-fix release. D-Link will not be liable for any direct, indirect, special, or consequential loss suffered by any party due to their use of the beta firmware, beta software, or hit-fix release.

 

NOTE: Our products have different hardware revisions, so please check your device’s hardware revision before downloading the corresponding firmware update. The hardware revision can be found on the product label next to the serial number or on the device's web interface.