Serious Flaws Discovered in D-Link Routers • Blisstech Solutions

Researchers at Fortinet have uncovered serious flaws in four D-Link routers.  The router vulnerabilities were found to allow for remote code execution which means a remote attacker could gain control of your router, snoop on your traffic and redirect your browser to malicious websites.

keyboard chained and padlocked

According to the researchers, four different models: DIR-652, DIR-655, DIR-866L and DHP-1565 could permit remote code execution.   These types of router vulnerabilities get found in routers every once in a while and the manufacturers typically fix it by releasing an updated version to the firmware. This time, however, D-Link confirmed that it wouldn’t be releasing new firmware for these four models because they’ve reached their end-of-life.

If that sounds a bit slopey shouldered, then you are correct.  One of the models, the DIR-866L, was introduced in 2014 and discontinued only in 2018. Another model, the DIR-655, was introduced in 2006, but also discontinued only last year.  Three of them — the DIR-655, DIR-866L and DHP-1565 — can still be bought new from third-party sellers on Amazon’s U.S. website, and the first is even an Amazon’s Choice model.

D-Link is no stranger to vulnerabilities; in September, researchers discovered vulnerabilities in D-Link routers that can leak passwords for the devices, and which have the potential to affect every user on networks that use them for access. And in May, a researcher found attackers using the Google Cloud Platform to carry out three separate waves of DNS hijacking attacks against vulnerable D-Link and other consumer routers.

Our advice is that if you own one of these routers then get yourself a new router ASAP.  Otherwise you are at risk of getting hacked.

Contact us to learn more about how you can find out if you are affected by this.

More Content

A person in a hoodie surrounded by green cipher text

3 Things You Must Do to Protect Against Ransomware

Ransomware is an increasingly common and devastating cyberattack that can happen to any business. The ransomware attacks that get the most media attention are those on high profile companies, but ransomware attacks on small businesses are increasing too. Many smaller...

5 steps to help recover from a cyber attack

Read this BEFORE you get hit with a cyber attack The worst time to decide how to deal with a cyber-attack is when you’re in the middle of one. Unfortunately, you’ll probably need to deal with it eventually—small and medium-sized businesses are prime targets for...
Beware that corrupted email attachment: It could be a scam

Beware that corrupted email attachment: It could be a scam

Cyber criminals get more creative every day. The latest scam designed to steal your business data uses corrupted Word files – and getting fooled is easier than you might think…

Microsoft Remove Delay Windows 10 Updates in version 2004

We recently wrote an article on how to delay Windows 10 updates so that you can wait until issues are resolved before you install new updates.  However, in the Windows 10 2004 update, Microsoft has removed the ability to delay Feature Updates for up to 365 days in the...
Here’s what’s in store for the last ever Windows ‘Moments’ update

Here’s what’s in store for the last ever Windows ‘Moments’ update

Microsoft will start to roll out its last Windows 11 ‘Moments’ update in a few weeks. After that it’s back to annual updates. We have all the details of the ‘Moments 5’ features you won’t want to miss. .

What is Proactive Monitoring and how can it protect your business?

How proactive monitoring will help your business weather any storm. You are the captain of your business's ship. You have a loyal and skilled team behind you. You are ready for any challenge! Or so you thought. Then, one day, without warning, a vast digital monster...
Blisstech - Top M365 Tools - Blog image

Unlock the Hidden Productivity Gems within Microsoft 365

Microsoft 365 is a cornerstone for many businesses, but its vast potential often remains untapped. While applications like Word, Excel, PowerPoint, and Teams are widely used, there's a treasure trove of productivity-enhancing tools waiting to be discovered. Embark on...
How to reopen a closed browser tab thumbnail

Tech Tip: How to quickly reopen a closed browser tab

Welcome to a new Tuesday tech tip video, and it's a really quick, but useful one This video shows how to quickly reopen a closed browser tab in Google Chrome or Edge. The video demonstrates a keyboard shortcut (Ctrl+Shift+T) to restore the last closed tab. I will also...
Is this the most dangerous phishing scam yet?

Is SubdoMailing the most dangerous phishing scam yet?

Bad news: Cyber criminals have yet another new phishing scam up their sleeves and it could be the most dangerous one yet. They’re using genuine subdomains that have been abandoned. We tell you how to stay safe.

Tech Tip: How to find the tools you need in Microsoft Office

Welcome to a new Tuesday tech tip video, and it's another speedy, but useful one Are you struggling to find the tools you need in Office applications? Me too! Since Microsoft introduced the ribbon in Office applications, it has become harder to find tools that you...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05