Critical Zero-Day Vulnerability Discovered in D-Link DIR-822 Routers by Ensign InfoSecurity

Researchers at Ensign InfoSecurity, Asia’s premier cybersecurity firm, have unveiled a critical zero-day vulnerability in the D-Link DIR-822 router, which poses significant security risks to users. This vulnerability, identified as a stack-based buffer overflow within the router’s Home Network Administration Protocol service, has been catalogued in the MITRE ATT&CK database, a globally recognized compendium of cyber threat information.

The flaw in question opens the door for cyber attackers to remotely execute arbitrary code on the affected devices, potentially leading to unauthorized access, data theft, or even integrating the routers into botnets. Ensign InfoSecurity has strongly advised users of the impacted routers to consider immediate replacement to prevent potential exploitation.

In light of this discovery, Ensign’s Cyber Threat Landscape Report 2023 emphasizes the heightened vulnerability of the energy and healthcare sectors in Singapore to cyber threats, underscoring the need for vigilant security measures across all sectors. Ensign, boasting Singapore’s largest incident response team and dedicated research and development units, is at the forefront of combating such cybersecurity challenges.

Tan Ah Tuan, Head of Ensign Labs, Ensign, said, “We live in an increasingly connected world, with more devices linked to the internet than ever before. This gives attackers full access to IoT devices like routers, which were not designed to defend against sophisticated attacks, and lets them exploit bugs in the software and gain full control. Through the deployment of Ensign InfoSecurity’s proprietary tools our vulnerability researchers automated our analysis, discovered the zero-day vulnerability, and approached D-Link with the information. We aspire to work closer with the community to combat vulnerability exploitation by malicious actors.”

Despite the release of firmware version v2.03B01 for DIR-822-CA (Rev.B) on October 27, 2023, the vulnerability remains unpatched, and with firmware development for the affected models having been discontinued, D-Link has advised users to retire and replace devices that have reached their end of life/support (EOL/EOS). The continued use of these devices poses a security risk to connected systems and underscores the critical need for current and secure hardware in defending against cyber threats.

Author

  • Hello! I’m Mark, the founder of techcoffeehouse.com. I love a good plate of Chicken Rice. So, if you have a story as good as the dish, HMU!

    View all posts Managing Editor

Discover more from techcoffeehouse.com

Subscribe to get the latest posts sent to your email.

Use promo code “TCH15” to get 15% off on checkout.

Share your thoughts

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from techcoffeehouse.com

Subscribe now to keep reading and get access to the full archive.

Continue reading

Discover more from techcoffeehouse.com

Subscribe now to keep reading and get access to the full archive.

Continue reading