• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10428
DAP-2610 : Rev. Ax / F/W v2.06B08r099 : Authenticated Command Injection Vulnerability.
Publication ID: SAP10428
Resolved Status: Yes
Published on: 27 May 2025 5:02 GMT
Last updated on: 27 May 2025 5:02 GMT

 

Overview

 

On May 12, 2025, a third party reported a D-Link DAP-2610 Wireless AC1300 Wave 2 Dual Band PoE Access Point hardware revision Ax with firmware version 2.06B08r099 (08/24/2023) or earlier, containing an Authenticated Command Injection vulnerability.  

 

When D-Link became aware of the reported security issues, we promptly started investigating and developing security patches. Patches were released within 90 days of the vulnerability report.

 

D-Link takes network security and user privacy very seriously. We have a dedicated task force and product management team available to address evolving security issues and implement necessary security measures. 

 

Report information  

 

      3rd Party Report   Bernardo Rodrigues :: brodrigues _at_ artresilia _dot_ com

 

               Vulnerability Type: Command Injection

               Endpoint: /index.xgi?random=2025.5.12.14.27.37&setPath=/runtime/time/&date=&time=&endSetPath=1  

               Payload: %60touch%20%2ftmp%2frcepoc.txt%60 (`touch /tmp/rcepoc.txt`)

               Vulnerable Parameters: Example date and time, other parameters may be able to be affected, to possible further exploits.

               This vulnerability requires an authorized “logged-in browser” session to the device at the time of the exploit.

 

Affected Models

 

Model

Affected Software Version

Region

Fixed Release

Last Updated

DAP-2610

2.06B08r099 and below

Global

v2.06B11r102

05/27/2025

 

Regarding the Security Update for Your D-Link Device

 

Installing software updates is critical in addressing security vulnerabilities in your D-Link devices. D-Link strongly urges all users to install the relevant updates and regularly check for further updates. After downloading the software update, it is essential to ALWAYS validate its success by comparing the software version on your product interface to the software update version.

 

Please note that beta software, beta firmware, or a hot-fix release is still undergoing rigorous testing before its official release. This ensures that the software is of the highest quality and meets our stringent standards. However, it is essential to understand that the user assumes all risk and liability for its use. D-Link does not provide express or implied warranties regarding the suitability or usability of the beta software, beta firmware, or hot-fix release. D-Link will not be liable for any direct, indirect, special, or consequential loss suffered by any party due to their use of the beta firmware, beta software, or hit-fix release.

 

NOTE: Our products have different hardware revisions, so please check your device’s hardware revision before downloading the corresponding firmware update. The hardware revision can be found on the product label next to the serial number or on the device's web interface.