Overview
The (Non-US) DSL-7740C, All hardware revisions have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle. D-Link US recommends that D-Link devices that have reached EOL/EOS be retired and replaced. Please get in touch with your regional office for recommendations (LINK).
As a general policy, when products reach EOS/EOL, they can no longer be supported, and all firmware development for these products ceases. Please read the information and recommendations below.
Report information
Report #1: CVE-2018-29514: Link : Incorrect access control in the config.xgi function of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows attackers to download the configuration file via providing a crafted web request.
Report #2: CVE-2018-29515: Link : Incorrect access control in the DELT_file.xgi endpoint of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows attackers to modify arbitrary settings within the device's XML database, including the administrator’s password.
Report #3: CVE-2018-29516: Link : ID-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 was discovered to contain a command injection vulnerability via the backup function.
Report #4: CVE-2018-29517: Link : ID-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 was discovered to contain a command injection vulnerability via the traceroute6 function.
Report #5: CVE-2018-29519: Link : A command injection vulnerability in the EXE parameter of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows attackers to execute arbitrary commands via supplying a crafted GET request.
Report #6: CVE-2018-29521: Link : Insecure default credentials for the Adminsitrator account of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows attackers to escalate privileges via a bruteforce attack.
Report #7: CVE-2018-29522: Link : D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 was discovered to contain a command injection vulnerability via the ping function.
Report #8: CVE-2018-29523: Link : D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 was discovered to contain a command injection vulnerability via the ping6 function.
Affected Models
Model
|
Region
|
Hardware Revision
|
End of Support
|
Legacy Website
|
Last Updated
|
DSL-7740C
|
Non-US
|
All H/W Revisions
|
04/30/2024
|
No, Non-US Product
|
09/03/2025
|
Recommendation for End of Support /End of Life Products
From time to time, D-Link will decide that some of its products have reached End of Support ("EOS") / End of Life (“EOL”). D-Link may choose to EOS/EOL a product due to the evolution of technology, market demands, new innovations, product efficiencies based on the latest technologies, or the product's maturity over time, which necessitates replacement with functionally superior technology.
For US Consumer
If a product has reached End of Support ("EOS") / End of Life ("EOL"), there is usually no further extended support or development for it.
Typically for these products, D-Link will be unable to resolve device or firmware issues since all development and customer support has ceased.
D-Link strongly recommends that this product be retired and cautions that any further use of this product may be a risk to devices connected to it. If US consumers continue to use these devices against D-Link's recommendation, please ensure the device has the most recent firmware, update its unique password frequently to access its web-configuration, and always enable WIFI encryption with a unique password.