Fortinet Discovers D-Link DIR-866L Unauthenticated RCE Vulnerability
Fortinet's FortiGuard Labs has discovered an unauthenticated Remote Code Execution vulnerability in D-Link products.
D-Link is a global leader in the design, manufacture and marketing of advanced networking, broadband, digital, voice and data communications solutions
We discovered a wide range of D-Link products that are vulnerable to unauthenticated remote code execution vulnerability. These product include but not limited to DIR-655C, DIR-866L, DIR-652 and DHP-1565. The issue occurs when the attacker send an arbitrary input to the device common gateway interface that could lead to common injection. Attacker who successfully trigger the command injection could result in full system compromise.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Sep 27, 2019
Users should upgrade to new product
Fortinet reported the vulnerability to D-Link on 22 September, 2019.
D-Link confirmed the vulnerability on 23 September, 2019.
D-Link confirmed these products are EOL on 25 September, 2019.
This vulnerability was discovered by Nguyen Thanh Nguyen of Fortinet's FortiGuard Labs.