Firmware: v1.04 B11 Beta 2015/03/10 NA Region Only!Revision Info: The reported exploit for remote code execution in ping.ccp
The reported exploit in UDPServer / MP Daemon
File Disclosure Issue
The reported exploit in diagnostic hooks below: o tftpd_ready.txt o chklst.txt o wps_default_pin.txt o usb_connect.txt o wps_btn.txt o reset_btn.txt o reboot_btn.txt o calibration_ready24G.txt o calibration_ready5G.txt o restore_default_finish.txt o set_mac_finish.txt o test_mode.txt o wifist.txt
The exploit of DNS hijacking in “fwupgrade.ccp”
NOTE: If your 836L router is working with out any issues, it's recommended to keep the current version of FW that is loaded unless your are effected by one of the fixes.IF IT WORKS, DON'T FIX IT!!! Get it here:
DIR-836LFollow the
FW Update Process