D-Link router vulnerabilities disclosed

This month has been quite eventful for D-Link. As reported by BleepingComputer, the company’s router firmware images have been leaking the secret key used to encrypt their proprietary firmware binaries.  

Now, the company has disclosed five severe vulnerabilities in some of their router models, which could allow a severe network compromise. Moreover, some devices have reached their “end of life” phase, which means they wouldn’t be patched.

CVE-2020-15892
aka Loginsoft-2020-1006
Stack-based Buffer OverflowA classic stack-based buffer overflow in the `ssi` binary, leading to arbitrary command execution.
CVE-2020-15893
 
Command InjectionCommand injection vulnerability in the UPnP via a crafted M-SEARCH packet
CVE-2020-15894
 
Sensitive Information ExposureExposed administration function allows unauthorized access to sensitive information.
CVE-2020-15895
aka Loginsoft-2020-1008
Cross-Site Scripting (XSS)Reflected XSS vulnerability on the device configuration webpage due to an unescaped value 
CVE-2020-15896
aka Loginsoft-2020-1007
Sensitive Information Exposure / Authentication Bypass BackdoorExposed administration function allows unauthorized access to sensitive information.

Models DAP-1522 and DIR-816L that have reached their “end of support” phase. These devices running firmware versions v1.42 (and below) and v12.06.B09 (and below) remain vulnerable with no upgrade path.

For the D-Link DAP-1520 model running vulnerable firmware versions v1.10B04 and below, the company has released an “Exceptional Beta Patch Release” firmware version v1.10b04Beta02 that users could upgrade to.

Users who are running these devices have no means of upgrading and will continue to remain vulnerable unless they purchase newer devices.

Read Full Article

Source: Bleeping Computer.com