• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10325
DIR-868L :: All Hardware Revisions :: All Firmware Revisions :: End-of-Life (EoL) / End-of-Service (EoS) :: Stack-Based Overflow Security Report
Publication ID: SAP10325
Resolved Status: Yes
Published on: 26 February 2023 11:28 GMT
Last updated on: 24 November 2025 9:02 GMT

Overview  

 

On January 30, 2023, a 3rd Party security professional brought a public disclosure from Panasonic Security Center of Panasonic Holdings Corporation to our attention.  This disclosure report for the DIR-868L hardware revision A1, firmware version v1.12. The vulnerability is in scandir.sgi binary, the vulnerability that exists in the parsing of the HTTP request header with the query field comes as input. Since there is no proper validation process in the length of user-supplied data before copying it to a fixed-length stack-based buffer, an attacker can send more data to the local stack buffer and then parse it. This allows the attacker to perform a Post-Authentication Buffer Overflow attack

 

This exploit affects a legacy D-Link router and all hardware revisions, which have reached their End of Life ("EOL")/End of Service Life ("EOS") Life-Cycle over three (3) years ago. Products that have reached their EOL/EOS no longer receive device software updates and security patches and are no longer supported by D-Link US (D-Link Systems, Inc.).
 

D-Link US recommends that D-Link devices that have reached EOL/EOS be retired and replaced. Please contact your regional office for recommendations (LINK).

 

  

 

 Regardless of product type or US sales channel, D-Link's general policy, when products reach EOS/EOL, they can no longer be supported, and all firmware development for these products cease. Please read the information and recommendations below.

 

3rd Party Report information

   
    - Reports provided: 

 

                    Report #1 - Panasonic Security Center of Panasonic Holdings Corporation

                                          :: Chang Nai-Hsin (Nancy) :: chang _dot_ nancy _at_ tw _dot_ panasonic _dot_ com

 

                    Report #2 - CVE-2025-63932 : Link : DIR-868L Rev Ax -  F/W v106KRb01.bin has an unauthenticated remote code execution vulnerability in the cgibin binary. The HNAP service provided by cgibin does not filter the HTTP SOAPAction header field.


             

Affected Models

  

Model Region Hardware Revision End of Service Life
Fixed Firmware US Legacy Website Last Updated
DIR-868L All Regions All H/W Revisions 11/01/2016  Not Available Yes (Link)  09/07/2022

  

Recommendation for End of Support /End of Life Products

   
From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to evolution of technology, market demands,  new innovations, product efficiencies based on new technologies, or the product matures over time and should be replaced by functionally superior technology.

 

For US Consumer

  
If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is normally no further extended support or development for it.

  

Typically for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support has ceased. 

 

D-Link US is prohibited to provide support for these EOL/EOS products, if your are outside the US, please contact your regional D-Link office. If your device was provided by licensed carrier (service provider) and firmware please contact your carrier (service provider). May devices on this list have available 3rd party open-firmware, D-Link does not support open-firmware which voids any warranty and is solely the responsibility of the device's owner.

 

D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please make sure the device has the last know firmware which can be located on the Legacy Website links above. Please make sure you frequently update the device's unique password to access its web-configuration, and always have WIFI encryption enabled with a unique password.