On October 1, 2018, NIVEL4 research team publicly disclosed vulnerabilities that affect the DIR-809 Hardware Revision A1/A2, and DIR-813 Hardware Revision B1. This vulnerability allowed an unauthenticated user to download the devices configuration file from the ethernet LAN-side (in-home) side of the router which dicloses credentials and other information regarding the device.
3rd Party Report information
Original 3rd Party Disclosure
(translation here)
CVE-ID Public Disclosures
Details
We advise you to read the Public Disclosure from the author.
There are two vulnerabilities:
- CVE-2018-14080: Incorrect Access Control / Authentication Bypass
- CVE-2018-14081 :CWE-256: Unprotected Storage of Credentials / CWE-312: Cleartext Storage of Sensitive Information / Plain Text Storage of WPA Key and Router Password (for unencrypted file).
Affected Products and Fixes:
Model |
Hardware Revision |
Affected FW |
Fixed FW |
Last Updated |
DIR-809 |
A1/A2 (non-US Models) |
v.1.09 and older (lower) |
v. 1.11B02_Beta |
11/14/2018 |
DIR-813 |
B1 (US Model) |
v.1.09 and older (lower) |
v. 2.10B02_Beta |
11/14/2018 |
Regarding Security patch for your D-Link Devices
Firmware updates address the security vulnerabilities in affected D-Link devices. D-Link will update this continually and we strongly recommend all users to install the relevant updates.
As there are different hardware revisions on our products, please check this on your device before downloading the correct corresponding firmware update. The hardware revision information can usually be found on the product label on the underside of the product next to the serial number. Alternatively, they can also be found on the device web configuration.