• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10341
DIR-825 :: H/W Revisions A thru I :: All F/W Version :: End-of-Life / End-of-Service :: Accused of Security Vulnerability
Publication ID: SAP10341
Resolved Status: Yes
Published on: 12 June 2023 11:22 GMT
Last updated on: 2 July 2024 2:28 GMT



The D-Link DIR-825 WiFi Router  all hardware revisions, are legacy devices as listed below in the table. All hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-CycleD-Link US recommends D-Link devices that have reached EOL/EOS, to be retired and replaced. Please contact your regional office for recommendations (LINK). 


As a  general policy, when products reach EOS/EOL, they can no longer be supported, and all firmware development for these products cease.  Please read information and recommendations below.

3rd Party Report information


Details : Reported 06/09/2023

Incident #1: Arizona State University, Laboratory of Security Engineering for Future Computing  (SEFCOM)

                     Hui Jun Tay :: hui _dot_ jun_dot_ tay _at_ gmail _dot_ com

                     Kyle Zeng :: zengyhkyle _at_ asu _dot_ edu

                     Jayakrishna Vadayath :: jvadayat _at_ asu _dot_ edu

                     Fish Wang :: fishw _at_ asu _dot_ edu

                     Yan Shoshitaishvili :: yans _at_ asu _dot_ edu

                     Adam Doupé :: doupe _at_ asu _dot_ edu


                    DIR-825 (v2.09EU Build: 09beta03) reference: /sbin/httpd
                    - Report #1: Stack overflow via strcat() at 0x4070e0 in do_file()

                    - Report #2: memcpy() at 0x408b50 copies user input into fixed size heap buffer and overflows it


Incident #2: Sejong University, Intelligence Security Lab. (ISEC)


                       Juhwan Kim, Ph.D. :: juhwan _at_ sju _dot_ ac _dot_ kr

                                Reported: 06/12/2024 :: Link to Public Disclosure


                      DIR-825 (H/W Rev. Bx F/W v2.10) stack-based buffer overflow


                     - Report #3: vulnerability found in the DIR-825 firmware, version Rev.B 2.10. This critical vulnerability is located within the /sbin/httpd file. It can be exploited to execute arbitrary code through the manipulation of the URI in the GET method of an HTTP request. A successful attack would enable the control of the registers $s0 to $s8, $ra, and $sp by sending a specially crafted HTTP request packet to the httpd process.


Accused Model


Model Region Hardware Revision End of Service Life
Fixed Firmware Legacy Website Last Updated
DIR-825 All Regions H/W Revisions Ax thru Ix*
01/01/2016 for Rev Bx
Not Available
Yes (Link)

 ** H/W revision Jx is still available in some non-US regions, it is not affected by this vulnerability.


Recommendation for End of Support /End of Life Products

From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to evolution of technology, market demands,  new innovations, product efficiencies based on new technologies, or the product matures over time and should be replaced by functionally superior technology.


For US Consumer


If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is normally no further extended support or development for it.


Typically for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support has ceased. 


D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please make sure the device has the most recent firmware, make sure you frequently update the device's unique password to access its web-configuration, and always have WIFI encryption enabled with a unique password.