NEVER GET BLOCKED AGAIN!
  • Fastest USA IPs in the industry
  • Unrivaled connection strength
  • All application compatible
  • Easy to use software
  • Anonymous browsing

DLink routers exposed to DNS hijacking

D Link’s DSL 2740R router is susceptible to traffic hijacking and rerouting, according to security researcher Todor Denev that is Bulgarian.

Sadly, Denev went public with his discovery before alarming Dlink or some other manufacturing company that was possibly affected, in what might be claimed to become an irresponsible type of disclosure.

The DSL 2740R is a member of Dlink’s present lineup but is still supported.

The prevalence of ZynOS means other routers made by Dlink, along with apparatus from TP-Link Technologies and ZTE, may also be in danger.

The flaw apparently allows an attacker to obtain the web interface of the device with no need for authentication.

When an administration panel is subjected to the web – and we strongly advise that you just do not do this! –

This really is not the first time for either D-Link ZynOS or.

In March 2014 an internet security research organisation, Team Cymru, found a network comprising more than 300,000 endangered routers.

Prior to that, another Dlink security hole was discovered – “Joel’s Backdoor”, which provided simple backdoor access to the management interface on several the organization ‘s routers.

But of course it is not only Dlink routers which have had their problems – in January 2014 we reported Sercomm products, including routers under the Netgear and Linksys brands, had their own problems encompassing admin accessibility that is unauthorised.

by admin on March 23rd, 2015 in DNS

There are no comments.

Name: Website: E-Mail:
XHTML: You can use these tags:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>