National CSIRT-CY | National Computer Security Incident Response Team of Cyprus

Η Εθνική Ομάδα Αντιμετώπισης Ηλεκτρονικών Επιθέσεων προβλέπει την αύξηση της ηλεκτρονικής ασφαλείας ενισχύοντας την προστασία του κυβερνοχώρου των Εθνικών Κρίσιμων Πληροφοριακών Υποδομών, των τραπεζών και των παροχών επικοινωνίας της Κυπριακής Δημοκρατίας.

D-Link DIR-600L wake_on_lan command injection

09 May 2025

The Digital Security Authority (DSA) wants to bring to your attention a vulnerability affecting D-Link DIR-600L. 

 

Technical Details

A vulnerability classified as critical was found in D-Link DIR-600L up to 2.07B01. This vulnerability affects the function wake_on_lan. The manipulation of the argument host leads to command injection, and the attack can be initiated remotely.

 

Affected Products:

The specific vulnerability affects only D-Link DIR-600L with firmware versions up to 2.07B01.

 

Recommendations

The Digital Security Authority recommends updating the D-Link DIR-600L to a version beyond 2.07B01. However, this vulnerability only affects products that are no longer supported by the maintainer.

 

References

  1.  Common Vulnerabilities & Exposures
  2.  Common Weakness Enumeration (CWE-74)
  3.  Common Weakness Enumeration (CWE-77)

 

The information presented in this report is based on available data up to the 7th of May 2025. 

 [ Get the report  in .PDF ]

 

Cyber threats require heightened defences

Working towards a trusted and cyber secure Europe

Protect your cyber hygiene

Cyber Europe 2022 [exercise]