• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10368
DIR-605L :: H/W Rev. Bx :: F/W v2.13B01 :: All Models :: All Revisions :: End-of-Life / End-of-Service-Life
Publication ID: SAP10368
Resolved Status: Yes
Published on: 22 December 2023 12:07 GMT
Last updated on: 2 December 2024 10:46 GMT

 

Overview  

On December 20, 2023, a 3rd Party brought a security report to D-Link's attention.  This disclosure report is for the DIR-605L hardware revision Bx, firmware v2.13b01. The vulnerability is an authenticated user can trigger incorrect access control that can elevate access on the LAN-Side of the router and possible further exploits of it's configuration.

  

This exploit affects a legacy D-Link router and all hardware revisions, which have reached their End of Life ("EOL")/End of Service Life ("EOS") Cycle on November 17, 2023.  Products that have reached their EOL/EOS no longer receive device software updates and security patches and are no longer supported by D-Link. Details can be found on here:(LINK)


D-Link US recommends that D-Link devices that have reached EOL/EOS be retired and replaced. .

Regardless of product type or sales channel, D-Link's general policy is that when products reach EOS/EOL, they can no longer be supported, and all firmware development for these products ceases. Please read the information and recommendations below.

 

3rd Party Report information

 

   
    - Reports provided:

                         -Report 1: Óscar Alfonso Díaz :: oscar _dot_ alfonso _dot_ diaz _at_ gmail _dot_ com

 

                         -Report 2: CVE-2024-11959 :  This affects the function formResetStatistic of the file /goform/formResetStatistic. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely.

                                                          CNA:  VulDB   Base Score:  9.0 HIGH   Vector:  (AV:N/AC:L/Au:S/C:C/I:C/A:C)
 

 

                         -Report 3: CVE-2024-11960: This vulnerability affects the function formSetPortTr of the file /goform/formSetPortTr. The manipulation of the argument curTime leads to buffer overflow.

 

                                                          CNA:  VulDB CVSS-B 8.7 HIGH  Vector:  CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
 

 

Affected Models

 Model

Region

Hardware Revision

End of Service Life

Fixed Firmware

Conclusion

Last Updated

DIR-605L

All Regions

All H/W Revisions

11/17/2023

Legacy Only (Link)

Retire & Replace Device

 12/21/2023

 

 

Recommendation for End-of-Support/End-of-Life Products

From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL an effect due to the evolution of technology, market demands, innovations, and product efficiencies based on new technologies, or the product matures over time and should be replaced by functionally superior technology.

 

 

For US Consumer  

If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is usually no further extended support or development for it.

Typically, for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support has ceased. 

 

D-Link US is prohibited from supporting these EOL/EOS products; if you are outside the US, please get in touch with your regional D-Link office. If your device was provided by a licensed carrier (service provider) and firmware, o get in touch with don’t hesitate to contact your carrier (service provider). Many devices on this list have available 3rd party open-firmware, D-Link does not support open-firmware, which voids any warranty and is solely the responsibility of the device's owner.

 

D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please make sure the device has the last know firmware which can be located on the Legacy Website links above. Please make sure you frequently update the device's unique password to access its web-configuration, and always have WIFI encryption enabled with a unique password.