Jump to content

Update on D-LINK Router "backdoor" Security issue-Fix due 10/31


ShyWriter
 Share

Recommended Posts

.

qe0n.gif

Update on Router Security issue

 

Security for your D-Link router
Various media reports have recently been published relating to vulnerabilities in network routers, including D-Link devices. Security and performance is of the utmost importance to D-Link across all product lines. This is not just through the development process but also through regular firmware updates to comply with the current safety and quality standards.

 

We are proactively working with the sources of these reports as well as continuing to review across the complete product line to ensure that the vulnerabilities discovered are addressed. 

 

We will continue to update this page to include the relevant product firmware updates addressing these concerns.
In the meantime, you can exercise the below cautions to avoid unwanted intrusion into your D-Link router.

 

Unsolicited emails

  • If you receive unsolicited e-mails that relates to security vulnerabilities and prompt you to action, please ignore it. When you click on links in such e-mails, it could allow unauthorised persons to access your router. Neither D-Link nor its partners and resellers will send you unsolicited messages where you are asked to click or install something.
  • Make sure that your wireless network is secure.
  • Disable remote access to your router if it is not required (this is disabled by default).

Security patch for your D-Link router
These firmware updates address the security vulnerabilities in affected D-Link routers. D-Link will update this continually and we strongly recommend all users to install the relevant updates.

 

As there are different hardware revisions on our products, please check this on your device before downloading the correct corresponding firmware update. The hardware revision information can usually be found on the product label on the underside of the product next to the serial number. Alternatively, they can also be found on the device web configuration.

 

Please make sure you follow the firmware install guide provided within the ZIP firmware package.

 

DI-524 Revision A1
Wed, 16/10/13
The new firmware 1.06b01 that fixes the security vulnerabilities will be available by 31st of October, 2013. 

 

DI-524UP Revision A1/A2
Wed, 16/10/13
The new firmware 1.08b01 that fixes the security vulnerabilities will be available by 31st of October, 2013.

 

DIR-100 Revision A1
Wed, 16/10/13
The new firmware 1.14b01 that fixes the security vulnerabilities will be available by 31st of October, 2013.

 

DIR-120 Revision A1
Wed, 16/10/13
The new firmware 1.05b01 that fixes the security vulnerabilities will be available by 31st of October, 2013.

 

DIR-300 Revision Ax
Mon, 29/04/13
The new firmware 1.06b02 that fixes the security vulnerabilities
DIR-300 Revision Ax 1.06b02
Please note: In the ZIP firmware packages, there are instructions in TXT that guides you on the firmware update.

 

DIR-300 Revision B1
Wed, 06/02/13
The new firmware 2.14b01 that fixes the security vulnerabilities
DIR-300 Revision B1 2.14b01
Please note: In the ZIP firmware packages, there are instructions in TXT and PDF that guides you on the firmware update.

 

DIR-600 Revision B1 and B2
Wed, 06/02/13
The new firmware 2.15b01 that fixes the security vulnerabilities
DIR-600 Revision B1 and B2 2.15b01
Please note: In the ZIP firmware packages, there are instructions in TXT and PDF that guides you on the firmware update.

 

DIR-600 Revision B5
Mon, 27/05/13
The new firmware 2.16b05 that fixes the security vulnerabilities
DIR-600 Revision B5 2.16b05
Please note: In the ZIP firmware packages, there are instructions in TXT and PDF that guides you on the firmware update.

 

DIR-615 Revision Dx
Mon, 29/04/13
The new firmware 4.14b02 that fixes the security vulnerabilities
DIR-615 Revision Dx 4.14b02
Please note: In the ZIP firmware packages, there are instructions in TXT that guides you on the firmware update.

 

DIR-645 Revision Ax
Mon, 29/04/13
The new firmware 1.04b05 that fixes the security vulnerabilities
DIR-645 Revision Ax 1.04b05
Please note: In the ZIP firmware packages, there are instructions in TXT that guides you on the firmware update.

 

DIR-815 Revision Ax
Mon, 29/04/13
The new firmware 1.04b02 that fixes the security vulnerabilities
DIR-815 Revision Ax 1.04b02
Please note: In the ZIP firmware packages, there are instructions in TXT that guides you on the firmware update.

 

DIR-845L Revision Ax
Mon, 29/04/13
The new firmware 1.01b02 that fixes the security vulnerabilities
DIR-845L Revision Ax 1.01b02
Please note: In the ZIP firmware packages, there are instructions in TXT that guides you on the firmware update.

 

DIR-865L Revision A1
Thu, 18/07/13
The new firmware 1.05b07 that fixes the security vulnerabilities
DIR-865L Revision A1 1.05b07
Please note: In the ZIP firmware packages, there are instructions in TXT that guides you on the firmware update.

 

DSL-320B Revision D2
Mon, 29/04/13
The new firmware 1.25 that fixes the security vulnerabilities
DSL-320B Revision D2 1.25
Please note: In the ZIP firmware packages, there are instructions in TXT that guides you on the firmware update.

 

DSL-321B Revision D2
Mon, 29/04/13
The new firmware 1.02 that fixes the security vulnerabilities
DSL-321B Revision D2 1.02
Please note: In the ZIP firmware packages, there are instructions in TXT that guides you on the firmware update.

 

SOURCE: http://www.dlink.com/be/fr/support/security

 

Steve

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.