Overview
The DIR-846, all hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle. D-Link US recommends D-Link devices that have reached EOL/EOS, to be retired and replaced. Please contact your regional office for recommendations (LINK).
Vulnerabilities reported after EoL/EoS date are reported below.
As a general policy, when products reach EOS/EOL, they can no longer be supported, and all firmware development for these products cease. Please read information and recommendations below.
3rd Party Report information
- Reports provided:
- Report 1: CVE-2024-41622: Link :
D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the tomography_ping_address parameter in /HNAP1/ interface.
NIST: NVD Base Score: 8.8 HIGH CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
ADP: CISA-ADP Base Score: 8.8 HIGH Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
3rd Party Public Disclsoure: yali-10012 : LINK
Disclosed: 08/27/2024
D-Link EOL/EOS : LINK
- Report 2: CVE-2024-44340: Link :
D-Link DIR-846W Firmware A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via keys smartqos_express_devices and smartqos_normal_devices in SetSmartQoSSettings. (Authenticated)
NIST: NVD Base Score: 8.8 HIGH Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
ADP: CISA-ADP Base Score: 8.8 HIGH Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
3rd Party Public Disclsoure: yali-10012 : LINK
Disclosed: 08/27/2024
D-Link EOL/EOS : LINK
- Report 3: CVE-2024-44341: Link :
D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the lan(0)_dhcps_staticlist parameter. This vulnerability is exploited via a crafted POST request.
NIST: NVD : Base Score 9.8 CRITICAL : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
ADP: CISA-ADP : Base Score 8.8 HIGH : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
3rd Party Public Disclsoure: yali-10012 : LINK
Disclosed: 08/27/2024
D-Link EOL/EOS : LINK
- Report 4: CVE-2024-44342: Link :
D-Link DIR-846W Firmware A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the wl(0).(0)_ssid parameter.
NIST: NVD : Base Score 9.8 CRITICAL : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
ADP: CISA-ADP : Base Score 8.8 HIGH : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
3rd Party Public Disclsoure: yali-10012 : LINK
Disclosed: 08/27/2024
D-Link EOL/EOS : LINK
Affected Models
Model |
Region |
Hardware Revision |
End of Support |
Legacy Website |
Last Updated |
DIR-846W
|
Non-US
|
All Series H/W Revisions
|
2/10/2020 |
No (Non-US)
|
08/30/2024 |
Recommendation for End of Support /End of Life Products
From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to evolution of technology, market demands, new innovations, product efficiencies based on new technologies, or the product matures over time and should be replaced by functionally superior technology.
For US Consumer
If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is normally no further extended support or development for it.
Typically for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support has ceased.
D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please make sure the device has the most recent firmware, make sure you frequently update the device's unique password to access its web-configuration, and always have WIFI encryption enabled with a unique password.