• April 16, 2024, 03:29:41 AM
  • Welcome, Guest
Please login or register.

Login with username, password and session length
Advanced search  

News:

This Forum Beta is ONLY for registered owners of D-Link products in the USA for which we have created boards at this time.

Author Topic: Unauthenticated Remote DNS Change Vulnerability (DNSChanger)  (Read 5016 times)

GreenBay42

  • Administrator
  • Level 11 Member
  • *
  • Posts: 2752
Unauthenticated Remote DNS Change Vulnerability (DNSChanger)
« on: April 18, 2019, 10:33:46 AM »

READ HERE/FIRMWARE --> https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10068

Affected Products:
  • DSL-2640B - Hardware Rev. T1 (Malaysia)
  • DSL-2740R - Hardware Rev. Ax (Europe)
  • DSL-2780B - Hardware Rev. Ax (AU/NZ/EU)
  • DSL-526B - Hardware Rev. Bx (AU)

Overview

The following was originally posted by D-Link in Dec. 2016. This announcement has been updated in regards to the latest information published on April 4, 2019, regarding DNSChanger Malware.

In December of 2016, Tom’s Guide published a report discussing “a new malvertising campaign attacking at least 166 models from multiple manufacturers.”

While there was evidence that the malware was targeting 166 distinct router models, only a few were identified. One of the identified models was the D-Link DSL-2740R. D-Link has previously offered firmware patches for this. D-Link has been made aware of a new post by a third party, which expands the scope of the identified products and firmware patches, naming the D-Link DSL-2640B, D-Link DSL-2780B, and D-Link DSL-526B. These products are not sold in the US.
Logged