Serious Flaws Discovered in D-Link Routers • Blisstech Solutions

Researchers at Fortinet have uncovered serious flaws in four D-Link routers.  The router vulnerabilities were found to allow for remote code execution which means a remote attacker could gain control of your router, snoop on your traffic and redirect your browser to malicious websites.

keyboard chained and padlocked

According to the researchers, four different models: DIR-652, DIR-655, DIR-866L and DHP-1565 could permit remote code execution.   These types of router vulnerabilities get found in routers every once in a while and the manufacturers typically fix it by releasing an updated version to the firmware. This time, however, D-Link confirmed that it wouldn’t be releasing new firmware for these four models because they’ve reached their end-of-life.

If that sounds a bit slopey shouldered, then you are correct.  One of the models, the DIR-866L, was introduced in 2014 and discontinued only in 2018. Another model, the DIR-655, was introduced in 2006, but also discontinued only last year.  Three of them — the DIR-655, DIR-866L and DHP-1565 — can still be bought new from third-party sellers on Amazon’s U.S. website, and the first is even an Amazon’s Choice model.

D-Link is no stranger to vulnerabilities; in September, researchers discovered vulnerabilities in D-Link routers that can leak passwords for the devices, and which have the potential to affect every user on networks that use them for access. And in May, a researcher found attackers using the Google Cloud Platform to carry out three separate waves of DNS hijacking attacks against vulnerable D-Link and other consumer routers.

Our advice is that if you own one of these routers then get yourself a new router ASAP.  Otherwise you are at risk of getting hacked.

Contact us to learn more about how you can find out if you are affected by this.

More Content

10 Simple Tips for Avoiding Phishing Scams: How to Stay Safe Online

10 Simple Tips for Avoiding Phishing Scams: How to Stay Safe Online What is Phishing? Phishing is a common online scam in which cybercriminals try to trick you into sharing personal information, such as passwords and credit card numbers. Phishers often use email or...
Bridging the trust gap between your employees and AI

Bridging the trust gap between your employees and AI

Have you noticed your employees are reluctant to use AI in the workplace? It may be down to their lack of trust. We explain how to show them AI is a tool that makes work better for everyone.

Why a business password manager is essential

Still using spreadsheets or sticky notes for your business passwords? It might seem harmless… but it’s one of the biggest risks to your security. Weak or reused passwords are how most hacks happen. And if one login gets leaked, cybercriminals can gain access to...

Tech Tip: How to use Search Outlook Folders to organise your Inbox

Welcome to a new Tuesday Two Minute Tech Tip that will help you to organise your inbox using the Outlook powerful search features. Are you the kind of person who likes to organise emails into folders? Are you manually dragging your emails around to organise them? This...

AI is making phishing scams more dangerous

AI chatbots have taken the world by storm lately. But for all the fun they offer, criminals have been finding ways to use AI for more sinister purposes.

Windows 11 optional update: Why it’s better to wait  

Microsoft has just announced an option for people to trial new features before their general release in Windows 11.  This isn’t about fixes to security flaws – everyone gets those at the same time.   This is an opportunity for businesses to jump the queue to receive new features and updates first.  Sound exciting?   Yes!   Worth the risk?   Not quite.  Our …
Read More

Microsoft: Criminals can access your accounts without your password

Microsoft: Criminals can access your accounts without your password

Just when you think you’ve got cyber security sorted for your business, a new scam comes along. This time, cyber criminals don’t even need to trick you out of your password to access your accounts… they can fool you with something called a “device code”.

Your business’s passwords are still too weak

Your business’s passwords are still too weak

“iloveyou”, “12345”, “qwerty1”. If I’ve just guessed all your passwords, you need to change them, immediately. Why? Because your passwords are STILL too weak. It’s a big problem…

Outlook will flag your most important emails

Outlook will flag your most important emails

Your inbox is about to get a powerful new ally. Find out how Outlook’s latest feature could help you cut through the noise of junk and spot the emails that really matter (and save time too)…

Cloud Telephony vs. VoIP – which is best for your business?

If your employees—or worse, your customers—have started to complain about your phone systems, it’s time to look at a new solution—something that works well for everyone, whether that’s making life easier for your team or giving your customers a smoother experience....
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05