• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10418
(Non-US) :: DSL-3788 :: H/W Rev. Ax/Bx :: F/W v1.01R1B036_EU_EN :: Unauthenticated Remote Code Execution (RCE) Vulnerability
Publication ID: SAP10418
Resolved Status: Yes
Published on: 27 January 2025 10:17 GMT
Last updated on: 28 January 2025 1:22 GMT

 

 

 

Overview

  

On November 25, 2024, a third party, from SECURE NETWORK BVTECH, reported the D-Link DSL-3788 hardware revision B2 with firmware version vDSL-3788_fw_revA1_1.01R1B036_EU_EN or below,  of a Unauthenticated Remote Code Execution (RCE) vulnerability.  

 

When D-Link became aware of the reported security issues, we promptly started investigating and developing security patches. Patches were release within the 90-day of the report of the vulnerabilities.

 

D-Link takes network security and user privacy very seriously. We have a dedicated task force and product management team on call to address evolving security issues and implement appropriate security measures.

 

 

 

Report information  

 

 

 

              3rd Party Report

 

             Max Bellia :: max.bellia _at_ securenetwork _dot_ it

             https://blog.sparrrgh.me/fuzzing/embedded/2025/01/26/fuzzing-embedded-systems-2.html

  

           It is possible to create a request with a specially crafted sessionid that, when received by the webproc CGI, will lead to the execution of arbitrary code. This happens because the fuction "COMM_MakeCustomMsg" of the libssap library used by the webproc CGI does not check the lenght of the input, leading to a buffer overflow.

 

 

 

Affected Models

 

Model Affected Software Version Region Fixed Release Last Updated
 DSL-3788 v1-01R1B036-EU-EN and below (Non-US) v1.01R1B037 01/27/2025

 

 Regarding the Security Update for Your D-Link Device

 

 

 

 

Installing software updates is critical in addressing security vulnerabilities in your D-Link devices. D-Link strongly urges all users to install the relevant updates and regularly check for further updates. After downloading the software update, it is essential to ALWAYS validate its success by comparing the software version on your product interface to the software update version.

 

 

 

 

Please note that beta software, beta firmware, or a hot-fix release is still undergoing rigorous testing before its official release. This ensures that the software is of the highest quality and meets our stringent standards. However, it is essential to understand that the user assumes all risk and liability for its use. D-Link does not provide express or implied warranties regarding the suitability or usability of the beta software, beta firmware, or hot-fix release. D-Link will not be liable for any direct, indirect, special, or consequential loss suffered by any party due to their use of the beta firmware, beta software, or hit-fix release.

 

 

 

 

NOTE: Our products have different hardware revisions, so please check your device’s hardware revision before downloading the corresponding firmware update. The hardware revision can be found on the product label next to the serial number or on the device's web interface.