D-Link issues hotfix for hard-coded password router vulnerabilities


D-Link has actually released a firmware hotfix to resolve several vulnerabilities in the DIR-3040 AC3000-based cordless web router.

Following effective exploitation, they can allow aggressors perform approximate code on unpatched routers, access to delicate info or collapse the routers after setting off a rejection of solution state.

The DIR-3040 protection defects uncovered as well as reported by Cisco Talos security researcher Dave McDaniel consist of hardcoded passwords, command shot, as well as info disclosure insects.

Authentication bypass through particularly crafted demands

The CVE-2021-21818 as well as CVE-2021-21820 hard-coded password as well as qualifications vulnerabilities [1, 2] exist in the router’s Zebra IP Routing Manager as well as the Libcli Test Environment performance.

Both of them enable hazard stars targeting susceptible D-Link DIR-3040 routers to bypass the verification procedure set up by the software program manager.

Attackers can activate them by sending out a series of particularly crafted network demands that lead either to rejection of solution as well as code implementation on the targeted router, specifically.

CVE-2021-21819, a vital OS command injection susceptability discovered in the router’s Libcli Test Environment performance, can additionally be abused by opponents for code implementation.

Additionally, it makes it feasible to begin a “hidden telnet service can be started without authentication by visiting https:///start_telnet” as well as log right into the Libcli examination atmosphere making use of a default password kept in unencrypted type on the router.

Vulnerabilities dealt with in firmware hotfix

D-Link has resolved the bugs discovered in firmware variation 1.13 B03 as well as has actually released a firmware hotfix for all impacted consumers on July 15, 2021, offered for download here.

The full listing of vulnerabilities dealt with by D-Link with these hotfix consists of:

  • CVE-2021-21816 – Syslog info disclosure susceptability
  • CVE-2021-21817 – Zebra IP Routing Manager info disclosure susceptability
  • CVE-2021-21818 – Zebra IP Routing Manager hard-coded password susceptability
  • CVE-2021-21819 – Libcli command shot susceptability
  • CVE-2021-21820 – Libcli Test Environment hard-coded password susceptability

D-Link states that the firmware hotfix launched to resolve the insects discovered by Cisco Talos is “a device beta software, beta firmware, or hot-fix release which is still undergoing final testing before its official release.”

The table listed below checklists the susceptible router designs as well as web links to the upgraded firmware variation consisting of the solution.

Model Hardware Revision Affected FW Fixed FW Recommendation Last Updated
DIR-3040 All Ax Hardware Revisions v1.13 B03 & & Below v1.13B03 Hotfix

1) Please Download Patch as well as Update Device

2) Full QA Firmware under examination for automated F/W upgrade alert on D-Link Wifi mobile App


D-Link has actually covered various other extreme vulnerabilities in several router designs in the past, consisting of remote command shot insects allowing aggressors to take full control of susceptible tools.

Previously, the firm repaired 5 vital vulnerabilities affecting several of its routers that made it feasible for hazard stars to take admin qualifications, bypass verification, as well as perform approximate code in shown Cross-Site Scripting (XSS) assaults.

Comments are closed.

buy levitra buy levitra online