Firmware:   v1.03 B01 and v2.04 B01 Beta   2015/03/10  NA and WW Regions!Revision Info: The reported exploit for remote code execution in ping.ccp 
 The reported exploit in UDPServer / MP Daemon 
 File Disclosure Issue 
 The reported exploit in diagnostic hooks below: o tftpd_ready.txt o chklst.txt o wps_default_pin.txt o usb_connect.txt o wps_btn.txt o reset_btn.txt o reboot_btn.txt o calibration_ready24G.txt o calibration_ready5G.txt o restore_default_finish.txt o set_mac_finish.txt o test_mode.txt o wifist.txt 
 The exploit of DNS hijacking in “fwupgrade.ccp”
NOTE:  If your DIR-810L router is working with out any issues, it's recommended to keep the current version of FW that is loaded unless your are effected by one of the fixes.IF IT WORKS, DON'T FIX IT!!!  
Get it here:
DIR-810L Rev ADIR-810L Rev BFollow the 
FW Update Process