• April 16, 2024, 04:05:10 PM
  • Welcome, Guest
Please login or register.

Login with username, password and session length
Advanced search  

News:

This Forum Beta is ONLY for registered owners of D-Link products in the USA for which we have created boards at this time.

Author Topic: DAP-1522 Publicly Disclosed Potential Vulnerability  (Read 6040 times)

JoeHombre

  • Level 1 Member
  • *
  • Posts: 23
DAP-1522 Publicly Disclosed Potential Vulnerability
« on: February 16, 2011, 10:12:45 AM »

Does anyone know the nature of the vulnerability that FW 1.31 is said to correct?

Joe
Logged

JoeHombre

  • Level 1 Member
  • *
  • Posts: 23
Re: DAP-1522 Publicly Disclosed Potential Vulnerability
« Reply #1 on: March 17, 2011, 06:16:08 AM »

Does anyone know the nature of the vulnerability that FW 1.31 is said to correct?

Joe

On the same day that I placed this post, I email D-Link product support asking the same question.  A month later, I have not received a reply from D-Link product support nor a D-Link forum moderator.

I consider it a reverent question to ask a manufacturer (re-branding) company for details about a potential vulnerability issue that they apparently didn’t know about initially then supposedly corrected.

If D-Link didn’t know of the vulnerability issue at first then sometime later discovered it and said it was fixed in a FW update -- are we to believe that the same folks that didn’t know the problem existed in the beginning is being honest that the issue was fixed?

If we the customers are not informed of the exact nature of the potential vulnerability problem how can we tell that it was fixed by being alert to possible vulnerability issues?  Also, what should those that do not update the FW be on-guard about?

Bad form D-Link.  You failed the integrity test, again!

Joe
Logged

zgates420

  • Level 1 Member
  • *
  • Posts: 23
Re: DAP-1522 Publicly Disclosed Potential Vulnerability
« Reply #2 on: March 18, 2011, 05:24:18 PM »

Well can you really blame them dude?  They probably don't want to give away any details of the vulnerability to prevent people from exploiting it.
Logged

JoeHombre

  • Level 1 Member
  • *
  • Posts: 23
Re: DAP-1522 Publicly Disclosed Potential Vulnerability
« Reply #3 on: March 18, 2011, 08:17:08 PM »

Well can you really blame them dude?  They probably don't want to give away any details of the vulnerability to prevent people from exploiting it.

I understand your point.  However, D-Link’s own web site for the FW 1.31 update (http://www.dlink.com/products/?pid=663) says “Closed a publicly disclosed potential vulnerability”.

So if the vulnerability has already been publicly disclosed -- likely, the bad folks already know what the “potential vulnerability” is.  But since, D-Link isn’t talking, only us good guys don’t know what the “potential vulnerability” is.

I call this poor customer support.

Joe
Logged

zgates420

  • Level 1 Member
  • *
  • Posts: 23
Re: DAP-1522 Publicly Disclosed Potential Vulnerability
« Reply #4 on: March 18, 2011, 11:18:56 PM »

That is a valid point.  I also find their customer support very annoying.  Any time I call, I just get some person who barely speaks english attempting to help me.  I have no problem with people who aren't fluent in english, but when I need to find a solution to a networking problem (ie DAP 1522 not working with DIR-815 in wireless n mode, only a/b/g), speaking with someone who speaks fluent english is merely the first basic requirement.  I don't understand the purpose of patching me through to someone who is just reading some s*** off of a flow chart, I may as well just be reading the dap-1522's website myself.  It's about as effective as putting 5 year old children on the phone.  Get real, people.
Logged

JoeHombre

  • Level 1 Member
  • *
  • Posts: 23
Re: DAP-1522 Publicly Disclosed Potential Vulnerability
« Reply #5 on: April 17, 2011, 07:10:07 AM »

Even though I still have not heard from Dink Product support or a Moderator on here, I did find this discussion http://www.dslreports.com/forum/r23623107-Help-Me-D-Link-Routers-One-Hack-to-Own-Them-All on DSLREPORTS which also contains this link http://dl.packetstormsecurity.net/papers/attack/dlink_hnap_captcha.pdf.  The bottom-line of those links is that without corrective FW, Log-ON for at lease some D-Link Routers, APs, Bridges, etc., could be hacked.

If so, it affects at lease some and maybe all D-Link network devices that use a Log-On, unless the FW has been updated by D-Link and loaded.  It would seem that affected D-Link equipment that has reached End-Of-Life and therefore no longer has FW updates remain vulnerable.

This info leads me to believe that the Potential DAP-1522 Vulnerability that I inquired about is in fact the one being discussed above.  If so, maybe the reasons that D-Link, didn’t respond and isn’t more explicit about this issue is to: (a) down-play the significance and (b) keep those customers without possibility of a corrective FW update in-the-dark.

Joe
Logged