Announcements > Security Advisories

Unauthenticated Remote DNS Change Vulnerability (DNSChanger)

(1/1)

GreenBay42:
READ HERE/FIRMWARE --> https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10068

Affected Products:
[*]DSL-2640B - Hardware Rev. T1 (Malaysia)
[*]DSL-2740R - Hardware Rev. Ax (Europe)
[*]DSL-2780B - Hardware Rev. Ax (AU/NZ/EU)
[*]DSL-526B - Hardware Rev. Bx (AU)
[/list]

Overview

The following was originally posted by D-Link in Dec. 2016. This announcement has been updated in regards to the latest information published on April 4, 2019, regarding DNSChanger Malware.

In December of 2016, Tom’s Guide published a report discussing “a new malvertising campaign attacking at least 166 models from multiple manufacturers.”

While there was evidence that the malware was targeting 166 distinct router models, only a few were identified. One of the identified models was the D-Link DSL-2740R. D-Link has previously offered firmware patches for this. D-Link has been made aware of a new post by a third party, which expands the scope of the identified products and firmware patches, naming the D-Link DSL-2640B, D-Link DSL-2780B, and D-Link DSL-526B. These products are not sold in the US.

Navigation

[0] Message Index

Go to full version