D-Link Routers at Risk of Hacking Due to Flaw

  • By Dawna M. Roberts
  • Published: Dec 11, 2020
  • Last Updated: Mar 18, 2022

A new report has come out that many D-Link VPN routers are at serious risk of hacking and remote control due to three major vulnerabilities. The report comes from an announcement by Digital Defense, an independent threat research firm.

The Issue

Back in August 2020, Digital Defense’s vulnerability research team (VRT) discovered the flaws in four D-Link product lines (DSR-150, DSR-250, DSR-500, and DSR-1000AC VPN routers running firmware versions 3.14 and 3.17).

Individuals and small-medium sized businesses use these devices. More people are working from home during the pandemic, and many could be connecting to the internet through these affected devices.

The flaw allows threat actors to connect with the router through WAN and LAN interfaces without authentication. That means they don’t need to log into it via the username/password combination, making it very dangerous and leaving victims exposed. The particular bug would allow a hacker to easily take complete control of the router and manipulate traffic, execute other types of attacks, and even gain access to other devices on the same network. 

ComputerWeekly reported that Mike Cotton, senior vice-president of engineering at Digital Defense, said: “Our standard practice is to work in tandem with organizations on a coordinated disclosure effort to facilitate a prompt resolution to a vulnerability.

“The Digital Defense VRT reached out to D-Link, which worked diligently on a patch. We will continue outreach to customers to ensure they are aware and able to take action to mitigate any potential risk introduced by the vulnerability, he added.”

D-Link’s Response

Although Digital Defense alerted D-Link in August, the company released a statement on December 1 saying that the patches won’t be released until some time this month. 

The Hacker News shared a quote from Digital Defense: “Consequently, a remote, unauthenticated attacker with access to the router’s web interface could execute arbitrary commands as root, effectively gaining complete control of the router.”

The defective component is called “Lua CGI” and allows threat actors to control the device without any authentication necessary. They can then execute malicious code or commands to take over other networked devices.

Digital Defense also let D-Link know about another potentially dangerous flaw in the router’s configuration at the time of the reporting, allowing hackers to inject rogue CRON entries. However, D-Link said it would not correct this issue. After fixing the other two flaws, without proper authentication, hackers could not effectively exploit this one.

D-Link and Digital Defense both urge corporate and home-based customers using these D-Link models to patch them as soon as the update is available. 

Tips to Keep Your Router/Network Safe

Although defective hardware and software can make your home or business network vulnerable to hackers, there are ways to ensure the highest level of safety to keep the bad guys out.

Use WPA, not WEP - Older routers use WEP for encryption; it is an outdated and less secure method. Purchase a router that offers the latest version (current WPA3). For added protection, you can also use WPA with a shared key. If your router provides WPS (wireless protected setup), use it to connect devices without logging in.

Create Strong Passwords - Use a really long, complex, strong password made up of symbols (even spaces), numbers, uppercase, and lowercase letters to secure your router.

Limited Guest Network - You can set up a separate limited network for guests. This is especially helpful for small businesses who want to offer Wi-Fi while their customers wait. 

Access Points - Scan your entire network for access points. Your employees or family members may have devices designed to boost your network signal, but if they aren’t configured correctly, they could put your entire network at risk.

Firewall - Be sure to configure and turn on your network firewall: a firewall controls and monitors traffic in and out. You can set limits for family members or employees (block sites they can visit) and control certain IPs that can/cannot connect through specific ports. 

Hide Your Network Name - do to broadcast your network name if you don’t want rogue actors to see it or connect to it. Being invisible can mean the difference between being hacked or not. 

Use a VPN - Use a VPN to mask your IP address and keep your network traffic private and secure. 

MAC Authentication - you can also turn on MAC authentication allowing only specific devices to connect to your network. This gives you granular control over your entire network. 

Even after doing all of this, you could still potentially encounter dangers. However, by implementing these security measures, you will have taken all the steps necessary to secure your network for the utmost security, privacy, and peace of mind.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

What is Bait and Switch Scams: How it Works and How to Avoid It

What is Bait and Switch Scams: How it Works and How to Avoid It

Ever follow an ad featuring limited-time products to a company's web page only to find they're selling something else entirely?

What is Intellectual Property Infringement, and How to Avoid It? 

What is Intellectual Property Infringement, and How to Avoid It? 

When we think of "property," the first thing that comes to our mind might be tangible objects—items we've purchased, like cars and homes, or entitlements we've procured, like land, titles, or even honorifics.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close