Firmware: v1.03 B01 and v2.04 B01 Beta 2015/03/10 NA and WW Regions!Revision Info: The reported exploit for remote code execution in ping.ccp
The reported exploit in UDPServer / MP Daemon
File Disclosure Issue
The reported exploit in diagnostic hooks below: o tftpd_ready.txt o chklst.txt o wps_default_pin.txt o usb_connect.txt o wps_btn.txt o reset_btn.txt o reboot_btn.txt o calibration_ready24G.txt o calibration_ready5G.txt o restore_default_finish.txt o set_mac_finish.txt o test_mode.txt o wifist.txt
The exploit of DNS hijacking in “fwupgrade.ccp”
NOTE: If your DIR-810L router is working with out any issues, it's recommended to keep the current version of FW that is loaded unless your are effected by one of the fixes.IF IT WORKS, DON'T FIX IT!!! Get it here:
DIR-810L Rev ADIR-810L Rev BFollow the
FW Update Process