This month has been quite eventful for D-Link. As reported by BleepingComputer, the company’s router firmware images have been leaking the secret key used to encrypt their proprietary firmware binaries.
Now, the company has disclosed five severe vulnerabilities in some of their router models, which could allow a severe network compromise. Moreover, some devices have reached their “end of life” phase, which means they wouldn’t be patched.
CVE-2020-15892 aka Loginsoft-2020-1006 | Stack-based Buffer Overflow | A classic stack-based buffer overflow in the `ssi` binary, leading to arbitrary command execution. |
CVE-2020-15893 | Command Injection | Command injection vulnerability in the UPnP via a crafted M-SEARCH packet |
CVE-2020-15894 | Sensitive Information Exposure | Exposed administration function allows unauthorized access to sensitive information. |
CVE-2020-15895 aka Loginsoft-2020-1008 | Cross-Site Scripting (XSS) | Reflected XSS vulnerability on the device configuration webpage due to an unescaped value |
CVE-2020-15896 aka Loginsoft-2020-1007 | Sensitive Information Exposure / Authentication Bypass Backdoor | Exposed administration function allows unauthorized access to sensitive information. |
Models DAP-1522 and DIR-816L that have reached their “end of support” phase. These devices running firmware versions v1.42 (and below) and v12.06.B09 (and below) remain vulnerable with no upgrade path.
For the D-Link DAP-1520 model running vulnerable firmware versions v1.10B04 and below, the company has released an “Exceptional Beta Patch Release” firmware version v1.10b04Beta02 that users could upgrade to.
Users who are running these devices have no means of upgrading and will continue to remain vulnerable unless they purchase newer devices.
Source: Bleeping Computer.com