Overview
On July 7, 2024, third-party security researcher reported an authenticated Remote Command Execution vulnerability in the (Non-US) DIR-823X Hardware Revision Ax, Firmware version 240126.
D-Link Corporation recognizes the security issue and is in process of developing patches for the issue.
D-Link takes network security and user privacy very seriously. We have a dedicated task force and product management team on call to address evolving security issues and implement appropriate security measures.
Report Information
- Report by: Adesh Nandkishor Kolte,
Offensive Security Engineer :: X.com (Twitter) https://x.com/AdeshKolte
Zokyolabs :: https://zokyo.io
- Report Details (from Author's Report)
- Summary
In this firmware version, the web server is not properly handling the ntp_zone_val
field in the CGI request for /goform/set_ntp
. This allows an attacker to craft a malicious ntp_zone_val
field and send a malicious HTTP request to the /goform/set_ntp
CGI, leading to command execution with administrator privileges on the firmware file system.
Affected Models
Regarding the Security Update for Your D-Link Device
Installing software updates is critical in addressing security vulnerabilities in your D-Link devices. D-Link strongly urges all users to install the relevant updates and regularly check for further updates. After downloading the software update, it is essential to ALWAYS validate its success by comparing the software version on your product interface to the software update version.
Please note that beta software, beta firmware, or a hot-fix release is still undergoing rigorous testing before its official release. This ensures that the software is of the highest quality and meets our stringent standards. However, it is essential to understand that the user assumes all risk and liability for its use. D-Link does not provide express or implied warranties regarding the suitability or usability of the beta software, beta firmware, or hot-fix release. D-Link will not be liable for any direct, indirect, special, or consequential loss suffered by any party due to their use of the beta firmware, beta software, or hit-fix release.
NOTE: Our products have different hardware revisions, so please check your device’s hardware revision before downloading the corresponding firmware update. The hardware revision can be found on the product label next to the serial number or on the device's web interface.