I don't use D-Link routers, I use a recycled computer turned into a router using IPCop, but if you have a D-Link router you should follow the links.
This is important because once a "bad guy" has control of your home router, he controls your internet traffic and can make you think you are at your bank's website when in fact you're at his copy of your bank's website.
D-Link issues fixes for router vulnerabilities
NOTE: The link in the Computerworld story is bad, click the corrected link here.
This is important because once a "bad guy" has control of your home router, he controls your internet traffic and can make you think you are at your bank's website when in fact you're at his copy of your bank's website.
D-Link issues fixes for router vulnerabilities
Router manufacturer D-Link Corp. today admitted that some of its routers have a vulnerability that could allow hackers access to a device's administrative settings. The Taipei, Taiwan-based form said that it has issued patches to fix the flaws.
According to a Jan. 9 blog post from SourceSec Security Research, some D-Link routers have an insecure implementation of the Home Network Administration Protocol (HNAP), which could allow an unauthorized person to change a router's settings.
SourceSec published a proof-of-concept software tool called HNAP0wn that would enable the hack -- a move that D-Link criticized.
... D-Link and SourceSec differed over which models were vulnerable. SourceSec wrote that it suspected that all D-Link routers made since 2006 with HNAP support were affected, but they said they had not tested all of them.
D-Link said the models affected are the DIR-855 (version A2), DIR-655 (versions A1 to A4) and DIR-635 (version B). Three discontinued models -- DIR-615 (versions B1, B2 and B3), DIR-635 (version A) and DI-634M (version B1) -- are also affected.
The company said new firmware updates are being made available across its Web sites.
NOTE: The link in the Computerworld story is bad, click the corrected link here.
No comments:
Post a Comment