An important security flaw has been identified in the DAP-2310, specifically impacting Hardware Revision A with Firmware version 1.16RC028.
The vulnerability, dubbed “BouncyPufferfish,” was discovered by Hahna Latonick from Dark Wolf Solutions. It exploits a stack-based buffer overflow in the ATP binary responsible for handling PHP HTTP requests for the Apache HTTP Server on the device.
D-Link has made an announcement regarding the official End-of-Life (EOL) and End-of-Service (EOS) status of the DAP-2310 Wireless Access Point and all its hardware revisions. Consequently, the device will no longer receive support or firmware updates.
It is strongly recommended by D-Link for users to retire and replace these devices to ensure network security and performance.
Discovery of Security Vulnerability
This vulnerability enables unauthenticated remote code execution (RCE), empowering attackers to run arbitrary shell commands on the device.
The exploit is activated by a meticulously crafted HTTP GET request, manipulating the buffer overflow to initiate a Return-Oriented Programming (ROP) chain, ultimately invoking the system() function.
This vulnerability impacts all hardware revisions of the DAP-2310 model globally. Support for the device ended on November 30, 2021, with the last update issued on July 9, 2024.
Guidelines for Users
D-Link underlines the necessity of replacing EOL/EOS devices to alleviate security threats. For users choosing to persist with the DAP-2310 despite recommendations, D-Link suggests implementing the following precautions:
- Ensure the device has the most recent firmware version.
- Regularly change the unique password for web configuration access on the device.
- Activate Wi-Fi encryption with a distinct password to safeguard the network.
With technological advancements, older devices such as the DAP-2310 are more prone to vulnerabilities and lack manufacturer support. Users are urged to upgrade to newer, more reliable devices for network integrity and security. To obtain additional assistance in selecting suitable replacements, users should reach out to their local D-Link office.
The article “D-Link Refuses to Patch RCE Vulnerabilities Impacting End-of-Life Routers” is originally published on Cyber Security News.