Overview
The DSR-150 / DSR-150N / DSR-250 / DSR-250N all harware versions and firmware version have been EOL/EOS as of 05/01/2024.
This exploit affects this legacy D-Link router and all hardware revisions, which have reached their End of Life ("EOL")/End of Service Life ("EOS") Life-Cycle. Products that have reached their EOL/EOS no longer receive device software updates and security patches and are no longer supported by D-Link US (D-Link Systems, Inc.).
D-Link US recommends that D-Link devices that have reached EOL/EOS be retired and replaced. Please contact your regional office for recommendations (LINK).
Regardless of product type or US sales channel, D-Link's general policy, when products reach EOS/EOL, they can no longer be supported, and all firmware development for these products cease. Please read the information and recommendations below.
D-Link Service Router Upgrade Offer for US Owners of the EOL/EOS displayed below
If you are an owner of a D-Link Model listed below and live in the US, D-Link will offer you a new DSR-250v2 at a reduced price.
To Claim your Upgrade:
1) Click the DSR Upgrade Offer link below to see the Router Offer. (Limit 1 per EOL/EOS Device per US Address)
2) Add to Cart -> Proceed to Check Out -> Press Check-Out Button.
3) The Discount will be applied in the checkout automatically for 20% off a new DSR-250v2
Link to Offer: Click Here
|
3rd Party Report information
- Reports provided:
- Reported to D-Link by delsploit : delsploit _at_ gmail _dot com
- Description: Stack buffer overflow vulnerability, which allows unauthenticated users to execute remote code execution.
- DSR-250 from firmware 3.13 to 3.17B901C
- DSR-250N from firmware 3.13 to 3.17B901C
- Link to Public Disclosure :: TBD
Affected Models
Model |
Region |
Hardware Revision |
End of Service Life
|
Fixed Firmware |
US Legacy Website |
Last Updated |
DSR-150
|
All Regions |
All H/W Revisions |
05/01/2024 |
Not Available |
Yes (Link) |
11/18/2024 |
DSR-150N
|
All Regions |
All H/W Revisions |
05/01/2024 |
Not Available |
Yes (Link) |
11/18/2024 |
DSR-250
|
All Regions |
All H/W Revisions |
05/01/2024 |
Not Available |
Yes (Link) |
11/18/2024 |
DSR-250N
|
All Regions |
All H/W Revisions |
05/01/2024 |
Not Available |
Yes (Link) |
11/18/2024 |
DSR-500N |
All Regions |
All H/W Revisions |
09/30/2015 |
Not Available |
Pending |
11/19/2024 |
DSR-1000N |
(Non-US) |
All H/W Revisions |
10/30/2015 |
Not Available |
Non-US |
11/19/2024 |
Recommendation for End of Support /End of Life Products
From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to evolution of technology, market demands, new innovations, product efficiencies based on new technologies, or the product matures over time and should be replaced by functionally superior technology.
For US Consumer
If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is normally no further extended support or development for it.
Typically for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support has ceased.
D-Link US is prohibited to provide support for these EOL/EOS products, if your are outside the US, please contact your regional D-Link office. If your device was provided by licensed carrier (service provider) and firmware please contact your carrier (service provider). May devices on this list have available 3rd party open-firmware, D-Link does not support open-firmware which voids any warranty and is solely the responsibility of the device's owner.
D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please make sure the device has the last know firmware which can be located on the Legacy Website links above. Please make sure you frequently update the device's unique password to access its web-configuration, and always have WIFI encryption enabled with a unique password.