First published: Tue Aug 10 2021(Updated: )
Null pointer dereference vulnerability in D-Link DAP-2310 2,10RC039, DAP-2330 1.10RC036 BETA, DAP-2360 2.10RC055, DAP-2553 3.10rc039 BETA, DAP-2660 1.15rc131b, DAP-2690 3.20RC115 BETA, DAP-2695 1.20RC093, DAP-3320 1.05RC027 BETA and DAP-3662 1.05rc069 in the sbin/httpd binary. The crash happens at the `atoi' operation when a specific network package are sent to the httpd binary.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dap-2310 Firmware | <=2.10rc039 | |
Dlink Dap-2310 | ||
Dlink Dap-2330 Firmware | <1.10rc036 | |
Dlink Dap-2330 Firmware | =1.10rc036-beta | |
Dlink Dap-2330 | ||
Dlink Dap-2360 Firmware | <=2.10rc055 | |
Dlink Dap-2360 | ||
Dlink Dap-2553 Firmware | <3.10rc039 | |
Dlink Dap-2553 Firmware | =3.10rc039-beta | |
Dlink Dap-2553 | ||
Dlink Dap-2660 Firmware | <=1.15rc131b | |
Dlink Dap-2660 | ||
Dlink Dap-2690 Firmware | <3.20rc115 | |
Dlink Dap-2690 Firmware | =3.20rc115-beta | |
Dlink Dap-2690 | ||
Dlink Dap-2695 Firmware | <=1.20rc093 | |
Dlink Dap-2695 | ||
Dlink Dap-3320 Firmware | <1.05rc027 | |
Dlink Dap-3320 Firmware | =1.05rc027-beta | |
Dlink Dap-3320 | ||
Dlink Dap-3662 Firmware | <1.05rc069 | |
Dlink Dap-3662 Firmware | =1.05rc069-beta | |
Dlink Dap-3662 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28838 is a null pointer dereference vulnerability in D-Link DAP-2310, DAP-2330, DAP-2360, DAP-2553, DAP-2660, DAP-2690, DAP-2695, DAP-3320, and DAP-3662 devices.
CVE-2021-28838 affects D-Link DAP-2310 devices running firmware version up to and including 2.10rc039.
CVE-2021-28838 has a severity score of 7.5 (high).
To fix CVE-2021-28838, D-Link DAP-2310 users should update their firmware to a version higher than 2.10rc039.
Yes, you can find additional information about CVE-2021-28838 in the following references: [link1](https://github.com/zyw-200/EQUAFL/blob/main/dlink-email-cve.pdf), [link2](https://github.com/zyw-200/EQUAFL/blob/main/dlink-email-cve2.pdf), [link3](https://www.dlink.com/en/security-bulletin/).