D-Link has plugged a security vulnerability involving protocol handling by some of its wireless routers that creates a potential means for normal users to grab super-user privileges.
The network manufacturer issued a firmware update that addresses a recently discovered bug in how its networking devices handle the Home Network Administration Protocol (HNAP). The flaw meant that the devices offered a shadow connection outside of the regular administrative access channel. This permanent unauthorised connection might be exploited by miscreants to assume admin privileges and change router settings, and might also be used to bypass CAPTCHA login features introduced by D-Link in recent firmware upgrades.
Successful exploitation requires valid login credentials, so the flaw is a privilege elevation risk rather than something more serious. The security shortcoming was found by SourceSec (advisory here (pdf)) and covered by D-Link with an advisory on Monday.
Only some of D-Link's routers are vulnerable. The networking manufacturer issued updates for its DIR-635, DIR-655 and DIR-855 routers.
Discontinued DIR-615, DI-634M and DIR-635 models are also at risk. An update for the DIR-615 is already available, with updates for the DI-653-M and DIR-635 is promised for upcoming weeks.
An (German language) advisory from D-Link explaining the issue in greater detail - along with a list of affected and not-at-risk models and links to firmware patches - can be found here. ®