• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10293
DIR-878.:: H/W Rev. A1 :: F/W vFW1.30B08_Hotfix_02:: Command Injection Vulnerabilities
Publication ID: SAP10293
Resolved Status: Yes
Published on: 21 March 2022 10:00 GMT
Last updated on: 1 February 2024 6:16 GMT



On January 6, 2021, a 3rd party security researcher reported the D-Link DIR-878 hardware revision A1 with firmware version vFW 1.30B08_Hotfix_02: with two of potential vulnerabilities.  


As soon as D-Link was made aware of the reported security issues, we had promptly started our investigation and began developing security patches. The 3rd party publically disclosed the issue prior to the patches being available on our standard 90 day security patch release schedule. We do not recommend security researches act in this manner as they expose end-users to further risks without patches being available from the manufacture.


D-Link takes the issues of network security and user privacy very seriously. We have a dedicated task force and product management team on call to address evolving security issues and implement appropriate security measures.


Report information  

        彭佳谦 :: pengjiaqian _at_ iie _dot_ ac _dot_ cn
                  :: wanghuizhao _at_ iie _dot_ ac _dot_ cn


                     - Vulnerability 1: Authenticated LAN-SIDE Command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request.


                     - Vulnerability 2: Authenicated LAN-Side Command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request.

Important Requirements to Apply Patched firmware:


- Prior to applying this patch you must update each patch available on D-Link Support Page : HERE


- Bsed on your current firmware which is displayed at the top of the devices web configuration pages, you select the next newest firmware and continue to update the firmware version till you have the latest v1.30b08 released on 08/21/20.


- If you have first v1.00 firmware you need update in consecutive order starting at 1. if you have v1.12b01 start at 5th firmware upgrade.


                     1st Upgrade) 1.01b04

                     2nd Upgrade) v1.10b05 which is a 2-Step update of v1.04b05 & v1.10b05

                     3rd Upgrade) v1.11b02

                     4th Upgrade) v1.12b01

                     5th Upgrade) v1.20b05

                     6th Upgrade) v1.30b06


- Once your device is on the latest firmware, proceed with the two firmware updates of this patch posted below. This patch is a hotfix, a fully tested firmware is being completed so that it will be on the automatic firmware update soon.


Affected Models


Model Hardware Revision  Region Affected FW Fixed FW Recommendation  Last Updated
DIR-878 All A1 Hardware Revisions Worldwide v1.30B08 vv1.30B08.4b_Beta_Hotfix Upgrade to Hotfix Beta


Regarding Security patch for your D-Link Devices
Firmware updates address the security vulnerabilities in affected D-Link devices. D-Link will update this continually and we strongly recommend all users to install the relevant updates.
Please note that this is a device beta software, beta firmware, or hot-fix release which is still undergoing final testing before its official release. The beta software, beta firmware, or hot-fix is provided on an “as is” and “as available” basis and the user assumes all risk and liability for use thereof. D-Link does not provide any warranties, whether express or implied, as to the suitability or usability of the beta firmware. D-Link will not be liable for any loss, whether such loss is direct, indirect, special or consequential, suffered by any party as a result of their use of the beta firmware.
As there are different hardware revisions on our products, please check this on your device before downloading the correct corresponding firmware update. The hardware revision information can usually be found on the product label on the underside of the product next to the serial number. Alternatively, they can also be found on the device web configuration.