Fortinet Discovers D-Link DIR-866L Cross-Site Scripting Vulnerability
Summary
Fortinet's FortiGuard Labs has discovered a Cross-Site Scripting vulnerability in D-Link products.
D-Link is a global leader in the design, manufacture and marketing of advanced networking, broadband, digital, voice and data communications solutions
We discovered a wide range of D-Link products that are vulnerable to cross-site scripting vulnerability. These products include but not limited to DIR-866L. The issue occurs when the attacker send an arbitrary input to the device common gateway interface that could lead to common injection. Attacker who successfully trigger the vulnerability could result in arbitrary code execution in user browser context.
Solutions
FortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:D-Link.DIR866L.HtmlResponseMessage.XSS
The affected product is End-of-Life (EOL). Users should follow the guidance released by the vendor
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10124
Additional Information
Fortinet reported the vulnerability to D-Link on 22 September, 2019.Â
D-Link confirmed the vulnerability on 23 September, 2019.Â
D-Link confirmed these products are EOL on 25 September, 2019.