Overview
The DIR-867 / DIR-878 / DIR-882 / DIR-1750 / DIR-1760 / DIR-1950 / DIR-1960 / DIR-2640 /DIR-2660 / DIR-3040 / DIR-3060 :: All Models, Derivative Models, All Revisions, and All Firmware reached their End-of-Life (EOL)/ End-of-Service Life (EOS) lifecycle. D-Link Corporation and D-Link North America (D-Link Systems, Inc.) recommend that all current users take one or more of the following actions:
1. Transition to a current-generation product.
2. Perform comprehensive data backup.
3. Contact our local regional office for further recommendations or information (LINK).
By standard industry practice, products that have reached EOL/EOS status may no longer receive technical support or firmware updates. Please read the detailed information and recommendations provided below.
3rd Party Report information:
Discovered: DIR-882 : 02/21/2024 / Reported: DIR-882 : 03/05/2025 :: Positive Technologies
Expanded: 03/05/2025 : DIR-867 / DIR-878 / DIR-1960 / DIR-2640 /DIR-2660 / DIR-3040 / DIR-3060
D-Link Expanded Scope: 03/05/2025 : DIR-1750 / DIR-1760 / DIR-1950
Author: Vladimir Razov / Positive Technologies / PT Swarm (Link)
Submitted: Diana Abdurakhmanova :: dabdurakhmanova _at_ ptsecurity _dot_ .com
Details: BDU:2024-06211 (Link): Russian FSTEC :: The D-Link router software vulnerability, which exists due to the failure to neutralize the special elements used in the operating system command, allowing the violator to affect the confidentiality, integrity and accessibility of the protected information
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVSS 2.0: AV:A/AC:L/Au:C/C/C/C/C:C/A:C/A:C
CVSS 3.0: A:A/AC:L/C/C/C::::H/H/H/A:H/H
Affected Models
Model
|
Region
|
Hardware Revision
|
End of Support
|
Legacy Website
|
Last Updated
|
DIR-867
|
Worldwide
|
All Series Models & H/W Revisions
|
04/01/2021
|
Yes (LINK)
|
03/10/2025
|
DIR-878
|
Worldwide
|
All Series Models & H/W Revisions
|
01/31/2021
|
Yes (LINK)
|
03/10/2025
|
DIR-882
|
Worldwide
|
All Series Models & H/W Revisions
|
10/31/2021
|
Yes (LINK)
|
03/10/2025
|
DIR-1750
|
Worldwide
|
All Series Models & H/W Revisions
|
06/30/2024
|
Yes (LINK)
|
03/10/2025
|
DIR-1760
|
Non-US
|
All Series Models & H/W Revisions
|
03/31/2024
|
Yes (LINK)
|
03/10/2025
|
DIR-1950
|
Worldwide
|
All Series Models & H/W Revisions
|
06/30/2024
|
Yes (LINK)
|
03/10/2025
|
DIR-1960
|
Non-US
|
All Series Models & H/W Revisions
|
03/31/2024
|
Yes (LINK)
|
03/10/2025
|
DIR-2640
|
Worldwide
|
All Series Models & H/W Revisions
|
06/30/2024
|
Yes (LINK)
|
03/10/2025
|
DIR-2660
|
Non-US
|
All Series Models & H/W Revisions
|
03/31/2024
|
Yes (LINK)
|
03/10/2025
|
DIR-3040
|
Worldwide
|
All Series Models & H/W Revisions
|
06/30/2024
|
Yes (LINK)
|
03/10/2025
|
DIR-3060
|
Non-US
|
All Series Models & H/W Revisions
|
03/31/2024
|
Yes (LINK)
|
03/10/2025
|
Recommendation for EOL /EOS Products
In line with industry practice, D-Link may periodically determine that certain products have reached a stage where further support or development is no longer attainable. This decision may be driven by commonly acknowledged factors such as technology evolution, market requirement, innovation, product efficiency, or the need for product replacement due to superior functionality.
For US Consumers
When a product reaches EOL/EOS status, which we have always announced for an extended period in advance, no further extended support, updates, or development may be available.
We may not be able to address issues related to devices or firmware for such products, as development and customer support may have been discontinued. If you are outside the US, please get in touch with your regional D-Link office for an inquiry.
We recommend discontinuing such products and caution that continued use may harm other connected devices. If users continue using these devices, please ensure they are updated to the latest known firmware on the Legacy Website links above. Additionally, users should frequently update a device's unique password to access its web configuration and always have Wi-Fi encryption enabled with a strong and unique password.
Regarding the Security Update for Your Device
Installing firmware updates is critical in addressing security vulnerabilities in your devices. We strongly urge all users to install the relevant updates and regularly check for further updates. After downloading the firmware update, it is essential to ALWAYS validate its success by comparing the firmware version on your product interface to the firmware update version.
Please note that beta software, beta firmware, or hot-fix release is still undergoing rigorous testing before its official release. This ensures it is of the highest quality and meets our stringent standards. Due to such nature, we do not provide express or implied warranties regarding its suitability or usability. It is essential to understand that the user assumes all risk and liability for its use.
NOTE: Our products have different hardware revisions, so please check your device’s hardware revision before downloading the corresponding firmware update. The hardware revision can be found on the product label next to the serial number or on the device's web interface.