CyberSecurity news

FlagThis - #d-link

@vulnerability.circl.lu //
A critical vulnerability has been discovered in the D-Link DIR-513 1.0 router, raising concerns about potential remote attacks. The flaw, residing within the `/goform/formSetWanPPTP` file, allows for a buffer overflow through manipulation of the `curTime` argument. This vulnerability is classified as critical because it can be exploited remotely, posing a significant risk to users of the affected router model. The details of the exploit have been made public, increasing the likelihood of malicious actors attempting to leverage it.

Unfortunately, D-Link no longer supports the DIR-513 1.0, meaning that no security patches or updates will be provided to address this critical vulnerability. Users are advised to consider upgrading their equipment.

Also of concern, six critical security vulnerabilities have been identified in D-Link DIR-816 routers, exposing users worldwide to the risk of remote code execution and network compromise. D-Link has declared its DIR-816 wireless router end-of-life (EOL) following the discovery of six critical security vulnerabilities, urging immediate replacement of all hardware revisions and firmware versions globally. With the DIR-816 entering EOL status on November 10, 2023, D-Link mandates immediate retirement of all DIR-816 units, transition to supported router models with active security updates and comprehensive configuration backups before decommissioning

Share: bluesky twitterx--v2 facebook--v1 threads


References :
  • Cyber Security News: Critical D-Link Router Flaws Allow Remote Code Execution by Attackers
  • gbhackers.com: Critical D-Link Router Flaws Allow Remote Code Execution by Attackers
  • securityonline.info: D-Link Router Flaw Allows Remote Code Execution, PoC Publishes, NO PATCH
  • circl: A vulnerability classified as critical has been found in D-Link DIR-513 1.0.
Classification:
  • HashTags: #DLink #RouterVulnerability #Security
  • Company: D-Link
  • Target: D-Link Users
  • Attacker: D-Link
  • Product: router
  • Feature: buffer overflow
  • Malware: buffer overflow
  • Type: Vulnerability
  • Severity: Major