• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10423
DIR-867 / DIR-878 / DIR-882 / DIR-1750 / DIR-1760 / DIR-1950 / DIR-1960 / DIR-2640 /DIR-2660 / DIR-3040 / DIR-3060 :: All Model Derivatives / All Revisions / All Firmware :: End-of-Life(EoL)/End-of-Service(EoS) :: Reported Vulnerabilities
Publication ID: SAP10423
Resolved Status: Yes
Published on: 11 March 2025 12:34 GMT
Last updated on: 11 March 2025 12:34 GMT

 

 

Overview

 

The DIR-867 / DIR-878 / DIR-882 / DIR-1750 / DIR-1760 / DIR-1950 / DIR-1960 / DIR-2640 /DIR-2660 / DIR-3040 / DIR-3060 :: All Models, Derivative Models, All Revisions, and All Firmware reached their End-of-Life (EOL)/ End-of-Service Life (EOS) lifecycle. D-Link Corporation and D-Link North America (D-Link Systems, Inc.) recommend that all current users take one or more of the following actions:

 

1.       Transition to a current-generation product.

2.       Perform comprehensive data backup.

3.       Contact our local regional office for further recommendations or information (LINK). 

 

By standard industry practice, products that have reached EOL/EOS status may no longer receive technical support or firmware updates. Please read the detailed information and recommendations provided below.

 

3rd Party Report information:

 

          Discovered: DIR-882 : 02/21/2024 / Reported: DIR-882 : 03/05/2025 :: Positive Technologies

         Expanded: 03/05/2025 : DIR-867 / DIR-878 / DIR-1960 / DIR-2640 /DIR-2660 / DIR-3040 / DIR-3060

         D-Link Expanded Scope: 03/05/2025 : DIR-1750 / DIR-1760 / DIR-1950

 

                 Author: Vladimir Razov / Positive Technologies / PT Swarm (Link)

 

                 Submitted: Diana Abdurakhmanova :: dabdurakhmanova _at_ ptsecurity _dot_ .com

 

                 Details: BDU:2024-06211 (Link): Russian FSTEC :: The D-Link router software vulnerability, which exists due to the failure to neutralize the special elements used in the operating system command, allowing the violator to affect the confidentiality, integrity and accessibility of the protected information

 

              CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

                              CVSS 2.0: AV:A/AC:L/Au:C/C/C/C/C:C/A:C/A:C

             CVSS 3.0: A:A/AC:L/C/C/C::::H/H/H/A:H/H

 

Affected Models

 

Model

Region

Hardware Revision

End of Support

Legacy Website

Last Updated

DIR-867

Worldwide

All Series Models & H/W Revisions

04/01/2021

Yes (LINK)

03/10/2025

DIR-878

Worldwide

All Series Models & H/W Revisions

01/31/2021

Yes (LINK)

03/10/2025

DIR-882

Worldwide

All Series Models & H/W Revisions

10/31/2021

Yes (LINK)

03/10/2025

DIR-1750

Worldwide

All Series Models & H/W Revisions

06/30/2024

Yes (LINK)

03/10/2025

DIR-1760

Non-US

All Series Models & H/W Revisions

03/31/2024

Yes (LINK)

03/10/2025

DIR-1950

Worldwide

All Series Models & H/W Revisions

06/30/2024

Yes (LINK)

03/10/2025

DIR-1960

Non-US

All Series Models & H/W Revisions

03/31/2024

Yes (LINK)

03/10/2025

DIR-2640

Worldwide

All Series Models & H/W Revisions

06/30/2024

Yes (LINK)

03/10/2025

DIR-2660

Non-US

All Series Models & H/W Revisions

03/31/2024

Yes (LINK)

03/10/2025

DIR-3040

Worldwide

All Series Models & H/W Revisions

06/30/2024

Yes (LINK)

03/10/2025

DIR-3060

Non-US

All Series Models & H/W Revisions

03/31/2024

Yes (LINK)

03/10/2025

 

 

Recommendation for EOL /EOS Products

  

In line with industry practice, D-Link may periodically determine that certain products have reached a stage where further support or development is no longer attainable. This decision may be driven by commonly acknowledged factors such as technology evolution, market requirement, innovation, product efficiency, or the need for product replacement due to superior functionality.

 

For US Consumers

 

When a product reaches EOL/EOS status, which we have always announced for an extended period in advance, no further extended support, updates, or development may be available.

 

We may not be able to address issues related to devices or firmware for such products, as development and customer support may have been discontinued. If you are outside the US, please get in touch with your regional D-Link office for an inquiry.

 

We recommend discontinuing such products and caution that continued use may harm other connected devices. If users continue using these devices, please ensure they are updated to the latest known firmware on the Legacy Website links above. Additionally, users should frequently update a device's unique password to access its web configuration and always have Wi-Fi encryption enabled with a strong and unique password.

 

Regarding the Security Update for Your Device

 

Installing firmware updates is critical in addressing security vulnerabilities in your devices. We strongly urge all users to install the relevant updates and regularly check for further updates. After downloading the firmware update, it is essential to ALWAYS validate its success by comparing the firmware version on your product interface to the firmware update version.

 

Please note that beta software, beta firmware, or hot-fix release is still undergoing rigorous testing before its official release. This ensures it is of the highest quality and meets our stringent standards. Due to such nature, we do not provide express or implied warranties regarding its suitability or usability. It is essential to understand that the user assumes all risk and liability for its use

 

NOTE: Our products have different hardware revisions, so please check your device’s hardware revision before downloading the corresponding firmware update. The hardware revision can be found on the product label next to the serial number or on the device's web interface.