Security update: Malicious code attacks can damage D-Link routers

In the latest firmware, D-Link developers have closed an apparently critical vulnerability in the DSL-3788 router.

listen Print view
Burglar wants to open back door in network device

(Image: Erstellt mit KI in Bing Designer durch heise online / dmk)

1 min. read

Because certain inputs are not sufficiently checked, attackers can push malicious code onto the D-Link DSL-3788 router and execute it. As a rule, devices are then considered fully compromised. The manufacturer has now released a security update and recommends urgent installation.

This is stated in an official support article. The vulnerability can be found in the COMM_MakeCustomMsg function of the libssap library. This allows attackers to send prepared requests to the webproc CGI. Because the length of the input is not checked, this leads to a memory error, which paves the way for malicious code.

Attacks should be possible remotely and without authentication. A CVE number has apparently not yet been assigned. As a result, the threat level has not yet been classified. The CERT Bund classifies the risk as “critical”.

Videos by heise

The vulnerability was discovered by a security researcher with the pseudonym Sparrrgh. He provides details in a blog post. D-Link states that it has closed the gap in version v1.01R1B037. It is currently not known whether there are already attacks. The manufacturer recommends a quick update.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.