Serious Flaws Discovered in D-Link Routers
Author : Matt Yarranton
9 October 2019

Researchers at Fortinet have uncovered serious flaws in four D-Link routers.  The router vulnerabilities were found to allow for remote code execution which means a remote attacker could gain control of your router, snoop on your traffic and redirect your browser to malicious websites.

keyboard chained and padlocked

According to the researchers, four different models: DIR-652, DIR-655, DIR-866L and DHP-1565 could permit remote code execution.   These types of router vulnerabilities get found in routers every once in a while and the manufacturers typically fix it by releasing an updated version to the firmware. This time, however, D-Link confirmed that it wouldn’t be releasing new firmware for these four models because they’ve reached their end-of-life.

If that sounds a bit slopey shouldered, then you are correct.  One of the models, the DIR-866L, was introduced in 2014 and discontinued only in 2018. Another model, the DIR-655, was introduced in 2006, but also discontinued only last year.  Three of them — the DIR-655, DIR-866L and DHP-1565 — can still be bought new from third-party sellers on Amazon’s U.S. website, and the first is even an Amazon’s Choice model.

D-Link is no stranger to vulnerabilities; in September, researchers discovered vulnerabilities in D-Link routers that can leak passwords for the devices, and which have the potential to affect every user on networks that use them for access. And in May, a researcher found attackers using the Google Cloud Platform to carry out three separate waves of DNS hijacking attacks against vulnerable D-Link and other consumer routers.

Our advice is that if you own one of these routers then get yourself a new router ASAP.  Otherwise you are at risk of getting hacked.

Contact us to learn more about how you can find out if you are affected by this.

More Content

Donated Laptops for Lockdown Learning

A Digital Divide It is a shocking fact that 9% of children in the UK, between 1.1 and 1.8 million, do not have a computer, laptop or mobile device in their home, according to research carried out by Ofcom. This pandemic is shining a stark light on the gap in provision...

VIDEO: How to Tidy up Copied Data in Excel

This Tuesday Two Minute Tech-tip shows you how to tidy up data in Excel spreadsheets. Do you have data in a messy format and need to change it so it is organised? Have you ever received data in Excel or in a text file or Word document and wanted to change it from rows...

Migrate to Microsoft 365 manually using PST files

When you are migrating to Microsoft 365 from an existing email provider, you'll want to migrate the emails, contacts and calendar from your users existing mailboxes to their shiny new Microsoft 365 mailboxes.  The best-case scenario is your provider will migrate you...

Microsoft urge users to patch against critical vulnerability

Microsoft is warning of a recently discovered critical Windows DNS Server vulnerability that is described as “wormable”. DNS (Domain Name Services) is used by computers all over the world to find each other. The Internet could not work without it. Microsoft DNS is...

3 Things You Must Do to Protect Against Ransomware

Ransomware is an increasingly common and devastating cyberattack that can happen to any business. The ransomware attacks that get the most media attention are those on high profile companies, but ransomware attacks on small businesses are increasing too. Many smaller...

What does the global chip shortage mean for your business?

For the past couple of years, the tech world has been struggling with a global chip shortage. But it’s not just tech businesses that are feeling the impact. So many of the things we use every day contain a chip. Laptops and desktops, sure. But also household...

VIDEO: The Power of Microsoft To Do

Hello everyone and welcome to a new Tuesday Two Minute Tech Tip.    👉 Do you want to get more organised?    👉 Do you wish you could see all of the things that you need to remember all in one place?    👉 Do you need a tool...

VIDEO: What is Autosave and Version History?

This is the latest Tuesday Two Minute Tech-tip that explains the AutoSave and Version History features of Office 365. When we migrate businesses to Microsoft 365 and they start working with OneDrive and SharePoint, I often hear the question, "How do I save my files...

VIDEO: How to use Mail Merge

This Tuesday Two Minute Tech-tip shows you how to automate customised emails and letters using Mail Merge. Imagine; you need to send a letter or email to 10s, or even 100s of people with the same base content, but personalised for each recipient. You could manually...

10 Simple Tips for Avoiding Phishing Scams: How to Stay Safe Online

10 Simple Tips for Avoiding Phishing Scams: How to Stay Safe Online What is Phishing? Phishing is a common online scam in which cybercriminals try to trick you into sharing personal information, such as passwords and credit card numbers. Phishers often use email or...
Share This