For latest information, go to
https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10093
On October 12, 2018, a 3rd-Party security researcher from Silesian University of Technology publicly disclosed three vulnerabilities that maybe used in combination to gain configuration access to some D-Link products.
D-Link is aware of the report alleged by the 3rd-party, and are in the process validating the claims stated in the report.
D-Link believes the 3rd-Party did misrepresent the vulnerabilities by broadly using the term "remote". The attacks described in the 3rd-Party Report require the device to respond to HTTP requests. These services are not available on the WAN-port (meaning Internet connection side) of D-Link Devices as default. This means that the attacks described in the report are limited to the LAN-side (Local or In-home connections) which narrows the potential threat since the attack would need to start from a malicious user connected to the device on the LAN-side.
D-Link will continue to investigate and release updated information as it becomes available.
Products accused (go to the link at the top to view status and firmware):
- DWR-111
- DWR-116
- DWR-512
- DWR-712
- DWR-912
- DWR-921
- DIR-140L
- DIR-640L