D-Link Forums

Announcements => Security Advisories => Topic started by: GreenBay42 on January 17, 2019, 07:14:14 AM

Title: DIR-655 - Rev C - Multiple Vulnerabilities
Post by: GreenBay42 on January 17, 2019, 07:14:14 AM
We have uncovered several critical flaws in the D-Link DIR-655 consumer grade router. In conjunction these issues allow an attacker to remotely take control of a user's device if they visit a malicious webpage.

The issues are as follows:
● Command injection via device configuration setting
● Setup wizard can be used to reset password to default
● Cross-site request forgery
● Multiple reflected cross-site scripting issues

Joel St. John
Security Consultant
NCC Group

Fixed Firmware (Revision Cx Only) - ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-655/REVC/DIR-655_REVC_FIRMWARE_v3.02B05_BETA03.zip (ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-655/REVC/DIR-655_REVC_FIRMWARE_v3.02B05_BETA03.zip)
Title: Re: DIR-655 - Rev C - Multiple Vulnerabilities
Post by: FurryNutz on January 17, 2019, 07:34:28 AM
Wow, I get to drag out my Rev C.  :o
Title: Re: DIR-655 - Rev C - Multiple Vulnerabilities
Post by: FurryNutz on September 25, 2019, 06:29:31 AM
8 months later, my Rev C went online last night.  ;D No issues seen thus far. Speeds are great. TS and QoS enabled. Feel odd working in the old UI.  :P Memories.  8) Will try and get some gaming in.  ;D
Title: Re: DIR-655 - Rev C - Multiple Vulnerabilities
Post by: GreenBay42 on September 25, 2019, 12:49:00 PM
Solid router :)
Title: Re: DIR-655 - Rev C - Multiple Vulnerabilities
Post by: FurryNutz on September 25, 2019, 12:51:00 PM
Was a work horse for many years.  ;) Works nicely with a WiFi AX upgrade.  :o
Title: Re: DIR-655 - Rev C - Multiple Vulnerabilities
Post by: FurryNutz on September 30, 2019, 11:29:17 AM
One issue i'm seeing with this build of FW, When I attempt to input a valid IP address or select an IP address from the Firewall/DMZ's List of detected devices, after enabling the check box and selecting Save Settings, Safari, Opera or FireFox displays:
"413 - Request Entity Too Large"

I'm trying to set a WiFi AP into the DMZ temporarily.

Seen this before in a earlier version of the Rev C FW versions years ago. I think when I was doing IP address reservations. I hoped this was gone...

Thoughts?