D-Link says it won't patch 60k older modems
Vulnerability and Technical Details
- Core issue: unauthenticated command injection in D‑Link firmware (notably NAS and some DSL routers) via a CGI endpoint that builds shell commands unsafely.
- The CGI script calls a helper binary which uses
sprintf+system()with user-controlled input, effectively allowing arbitrary shell execution. - Some debate over exact URL encoding in the proof-of-concept, but consensus that the implementation is egregiously insecure and yields instant root via a simple GET.
CVE Scores and Real-World Risk
- Multiple CVEs (some at 9.8) across NAS and router product lines; some fixed via firmware, others explicitly “no fix, buy a new one.”
- Discussion that CVSS scores are often misused or sensationalized, yet a 9.8 on an internet-exposed device is widely seen as genuinely serious.
- Several note that exposing consumer NAS directly to the internet has long been risky regardless of vendor.
D-Link’s Response and EOL Debate
- D-Link declines to patch older, EOL devices (around 60k modems/routers), telling users to replace them.
- Some argue this is expected once EOL is clearly signposted; others say the devices shipped “defective” and should be fixed regardless of age.
- Many doubt typical consumers understand or even know about EOL timelines, especially for ISP‑provided hardware.
User Impact, Botnets, and Threat Models
- Concern that unpatched devices become easy botnet nodes and may be abused for traffic proxying, DDoS, or ransomware entry points.
- Discussion of how powerful router SoCs are sufficient for traffic redirection, MITM (if you can get a cert installed), or bricking.
Alternatives and Workarounds
- Strong recommendations for OpenWRT, MikroTik, Ubiquiti, OPNsense/pfSense, and OpenBSD-based setups for long-term support.
- Caveats: many affected D-Link models lack resources or active OpenWRT support; consumer “flash your own firmware” is niche.
Regulation, Liability, and Firmware Openness
- Proposals: mandatory minimum support periods, on-box EOL dates, auto‑update and explicit EOL warnings, or forced open-sourcing of firmware at EOL.
- EU initiatives (Cyber Resilience Act, Product Liability Directive) are cited as moves toward requiring vulnerability handling for a defined support period.
- Concerns that simply “dumping code on the community” doesn’t guarantee competent third‑party maintenance.
Broader IoT Software Quality Concerns
- Many see this as symptomatic of cheap, outsourced IoT firmware with minimal security practices.
- Repeated theme: consumers get low prices at the cost of security, longevity, and environmental waste from premature obsolescence.