Zero-Day Advisory
Fortinet Discovers D-Link DIR-866L Unauthenticated RCE Vulnerability
Summary
Fortinet's FortiGuard Labs has discovered an unauthenticated Remote Code Execution vulnerability in D-Link products.
D-Link is a global leader in the design, manufacture and marketing of advanced networking, broadband, digital, voice and data communications solutions
We discovered a wide range of D-Link products that are vulnerable to unauthenticated remote code execution vulnerability. These product include but not limited to DIR-655C, DIR-866L, DIR-652 and DHP-1565. The issue occurs when the attacker send an arbitrary input to the device common gateway interface that could lead to common injection. Attacker who successfully trigger the command injection could result in full system compromise.
Solutions
FortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:DLink.DIR866L.PingTest.RCE
Released Sep 27, 2019
Users should upgrade to new product
Timeline
Fortinet reported the vulnerability to D-Link on 22 September, 2019.
D-Link confirmed the vulnerability on 23 September, 2019.
D-Link confirmed these products are EOL on 25 September, 2019.