R15 / M15: Open DNS Resolver Vulnerability
13 września, 2022
On August 25, 2022, a 3rd party security researcher reported the EAGLE PRO AI R15 hardware revision Ax with firmware version v1.06.07 with an open DNS Resolver vulnerability.
As soon as D-Link was made aware of the reported security issues, we promptly started our investigation and began developing security patches.
D-Link takes the issues of network security and user privacy very seriously. We have a dedicated task force and product management team on call to address evolving security issues and implement appropriate security measures.
Report information
3rd Party
Alexander Traud :: pabstraud _at_ compuserve _dot_ com
Report:
When placed in "Wi-Fi Access Point" Mode an attack vector can be exploited in it's Open DNS Resolver
Not in the mode "Router" but "Access Point" (Web interface Settings Operation Mode Bridge button Save) the device still acts as a DNS proxy (53/udp and 53/tcp). Such an an Open DNS Resolver [1] is considered a security issue. For example, I deploy the device in a hotel. An attacker can use that DNS proxy to circumvent a Captive Portal of that hotel Wi-Fi. This attack is known and ready to exploit by tools existing on the Internet, like HTTP-over-SSH-over-DNS services, called DNS Tunneling [2]. With that attack scenario, I calculated a HIGH rating in CVSS 3.1.
Affected Models
Model | Hardware Revision | Region | Affected FW | Fixed FW | Recommendation | Last Updated |
R15 | All A Hardware Revisions | US | v1.06.07& Below | v1.06.11HotFix Beta | Manually update to Hotfix Beta via Web Interface |
09/13/2022 |
M15 | All A Hardware Revisions | US | v1.06.07& Below | v1.06.11HotFix Beta | Manually update to Hotfix Beta via Web Interface | 09/13/2022 |