D-Link is telling users to stop using these routers immediately, or face hacking
Critical RCE flaw was found in multiple D-Link routers
- Security researchers find a critical remote code execution flaw in multiple D-Link router models
- The models reached end of life status last spring, meaning the flaw won't be patched
- D-Link urges users to replace the devices with newer models immediately
A critical vulnerability, allowing for remote code execution (RCE) attacks, has been discovered on multiple D-Link VPN routers.
However, since the models have now reached end-of-life, D-Link will not be issuing a patch - and instead, it urged users to retire the affected devices and replace them with newer, supported models.
The flaw does not have a CVE designation just yet, but the company, as well as the researcher who found the flaw - alias ‘desploit’ - will not be releasing any details about it, to give affected customers enough time to react. In any case, once word gets out, cybercriminals will definitely start scanning for vulnerable routers, so if you’re using one of these models, make sure to replace them as soon as possible:
DSR-150
DSR-150N
DSR-250
DSR-250N
No workarounds
D-Link said that both hardware and firmware for these devices have expired, and workarounds are not recommended:
"The DSR-150 / DSR-150N / DSR-250 / DSR-250N all hardware versions and firmware versions have been EOL/EOS as of 05/01/2024. This exploit affects this legacy D-Link router and all hardware revisions, which have reached their End of Life [...]. Products that have reached their EOL/EOS no longer receive device software updates and security patches and are no longer supported by D-Link US,” D-Link said in a recent security advisory.
"D-Link strongly recommends that this product be retired.”
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Routers, being the gateways of all internet traffic on a local network, are usually the first thing criminals will try to compromise in their attacks. End-of-life devices with known critical vulnerabilities, especially RCE, are considered low hanging fruit.
Furthermore, the affected device versions are often used in homes and small businesses, according to a recent BleepingComputer report. That makes them an ideal target for malware deployment, distributed denial of service botnets, and possibly even ransomware attacks.
Via BleepingComputer
You might also like
- D-Link says it won't patch 60,000 older modems, as they're not worth saving
- Here's a list of the best firewalls today
- These are the best endpoint protection tools right now
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.