D-Link tells users to stop these routers immediately or they will be hacked
- Security researchers discover a critical remote code execution flaw in multiple D-Link router models
- The models reached end-of-life status last spring, meaning the bug will not be fixed
- D-Link urges users to immediately replace the devices with newer models
A critical vulnerability has been discovered that allows Remote Code Execution (RCE) attacks on multiple D-Link VPN routers.
However, because the models have now reached the end of their lifespan, D-Link will not release a patch. Instead, it urges users to retire affected devices and replace them with newer, supported models.
The flaw does not yet have a CVE designation, but the company, as well as the researcher who found the flaw – aka ‘desploit’ – will not release details about it, to give affected customers enough time to respond. Either way, once word gets out, cybercriminals will definitely start scanning for vulnerable routers, so if you’re using one of these models, make sure you replace it as soon as possible:
DSR-150
DSR-150N
DSR-250
DSR-250N
No solutions
D-Link said that both the hardware and firmware for these devices have expired and solutions are not recommended:
“The DSR-150 / DSR-150N / DSR-250 / DSR-250N, all hardware versions and firmware versions are EOL/EOS as of 2024-05-01. This exploit affects this older D-Link router and all hardware revisions, which have reached the end of their lifespan […]. Products that have reached their EOL/EOS will no longer receive device software updates and security patches and will no longer be supported by D-Link US,” D-Link said in a recent security advisory.
“D-Link strongly recommends discontinuing this product.”
Routers, which are the gateways for all Internet traffic on a local network, are usually the first thing criminals try to compromise in their attacks. Devices that are nearing the end of their lifespan and are known to have critical vulnerabilities, especially RCE, are considered low-hanging fruit.
Additionally, according to a recent publication, the affected device versions are commonly used in homes and small businesses BleepingComputer report. That makes them an ideal target for the deployment of malware, distributed denial-of-service botnets and possibly even ransomware attacks.
Via BleepingComputer