D-Link News Articles
Recent news articles refferecing the vendors vulnerabilities.
Hackers target critical flaw CVE-2024-10914 in EOL D-Link NAS Devices
The exploitation of the recently disclosed ‘won’t fix’ issue CVE-2024-10914 in legacy D-Link NAS devices began days after its disclosure.
Unpatched Flaw in Legacy D-Link NAS Devices Exploited Days After Disclosure
Exploitation attempts targeting CVE-2024-10914, a recently disclosed ‘won’t fix’ vulnerability affecting outdated D-Link NAS devices.
Critical bug in EoL D-Link NAS devices now exploited in attacks
Attackers now target a critical severity vulnerability with publicly available exploit code that affects multiple models of end-of-life D-Link network-attached storage (NAS) devices.

D-Link will not fix a critical vulnerability in discontinued NAS devices
A recently disclosed security vulnerability impacting D-Link NAS devices will remain unpatched, as the Taiwanese manufacturer confirmed these models have reached their end-of-life / end-of-service status. This...

D-Link To Not Fix Critical Bug Found In End-of-Life NAS Devices - The Cyber Express
A severe security flaw in outdated D-Link network-attached storage (NAS) devices leaves over 61,000 units exposed online with no patches.
D-Link won’t fix critical flaw affecting 60,000 older NAS devices
More than 60,000 D-Link network-attached storage devices that have reached end-of-life are vulnerable to a command injection vulnerability with a publicly available exploit.
SAP, D-Link flaws among 4 added to Known Exploited Vulnerabilities catalog
Older, unpatched vulnerabilities remain a risk for organizations.
U.S. CISA adds D-Link DIR-820 Router, DrayTek Multiple Vigor Router, Motion Spell GPAC, SAP Commerce Cloud bugs to its Known Exploited Vulnerabilities catalog
CISA adds D-Link Routers, DrayTek Multiple Vigor Router, Motion Spell GPAC, SAP Commerce Cloud bugs to Known Exploited Vulnerabilities catalog

CISA Warns of Four Vulnerabilities that Exploited Actively in the Wild
CISA Warns of Four Vulnerabilities that Exploited Actively in the Wild. CVE-2023-25280, CVE-2020-15415, CVE-2021-4043, CVE-2019-0344

Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware
China-linked hackers exploit Cisco switch flaw to deliver malware. Unpatched D-Link routers expose user accounts.

Vulnerability In EOL D-Link DIR-859 Routers Exploited
The D-Link DIR-859 WiFi routers have been found to have a path traversal vulnerability (CVE-2024-0769) that allows for information disclosure.
Threat actors actively exploit D-Link DIR-859 router flaw
Experts spotted threat actors exploiting the critical vulnerability CVE-2024-0769 affects all D-Link DIR-859 WiFi routers.
Hackers exploit critical D-Link DIR-859 router flaw to steal passwords
Hackers are exploiting a critical vulnerability that affects all D-Link DIR-859 WiFi routers to collect account information from the device, including passwords.

Несколько миллионов роутеров D-Link имеют встроенный бэкдор | Новость CISOCLUB
В нескольких популярных моделях беспроводных роутеров D-Link выявлена критическая уязвимость CVE-2024-6045, которая позволяет хакерам без аутентификации получать доступ администратора к целевым устройствам. По словам экспертов, обнаруживших эту ошибку, она имеет серьёзный уровень опасности с оценкой...

CVE-2024-6045: в миллионах роутеров D-Link обнаружен встроенный бэкдор
Полномочия администратора дают хакерам безграничный доступ к скомпрометированным устройствам.

Пост @denis-19 — Информационная безопасность — 17.06 19:39
В части моделей беспроводных маршрутизаторов D-Link экспертами по ИБ выявлен бэкдор ( CVE-2024-6045 ), позволяющий неаутентифицированному пользователю из локальной сети активировать на устройстве...

Hidden Backdoor in D-Link Routers Let Attacker Login as Admin
A vulnerability has been discovered in D-Link routers, allowing unauthenticated attackers to gain administrative access to the devices.

CVE-2024-5296 : D-LINK D-VIEW 2.0.1.28 TOKENUTILS HARD-CODED KEY - Cloud WAF
CVE-2024-5296 - D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of D-Link D-View.
Hackers Actively Exploit Critical D-Link NAS Vulnerabilities on EoL Devices
In late March 2024, critical vulnerabilities were disclosed in D-Link NAS devices, allowing unauthorized access and command execution. Nearly 92,000 devices were at risk, attracting threat actors. D-Link issued a security advisory and recommended upgrading affected devices, implementing security mea...
CISA adds D-Link multiple NAS devices bugs to its Known Exploited Vulnerabilities catalog
CISA adds D-Link multiple NAS devices bugs to its Known Exploited Vulnerabilities catalog

CVE-2024-3273: D-Link NAS RCE Exploited in the Wild | GreyNoise Blog
Check out this blog to stay informed about a critical remote code execution vulnerability affecting D-Link NAS devices. It is being tracked under CVE-2024-3273 and believed to affect as many as 92,000 devices.

Decoding D-Link NAS Vulnerabilities: Risks And Mitigation
he latest on D-Link NAS vulnerabilities (CVE-2024-3272 & CVE-2024-3273) affects enterprises with active exploitation.
Exploitation of Unpatched D-Link NAS Device Vulnerabilities Soars
Second identifier, CVE-2024-3272, assigned to unpatched D-Link NAS device vulnerabilities, just as exploitation attempts soar.
D-Link NAS device vulnerabilities exploited – no patch available
An attacker could gain remote access to network-attached storage and execute arbitrary commands.
92K D-Link NAS Devices Open to Critical Command-Injection Bug
The company is asking users to retire several network-attached storage (NAS) models to avoid compromise through a publicly available exploit that results in backdooring.
Over 92k D-Link devices exposed to CVE-2024-3272 & CVE-2024-3273 vulnerabilities
Attackers are actively exploiting CVE-2024-3272 & CVE-2024-3273 vulnerabilities to steal sensitive information, engaging in remote execution of arbitrary commands, to orchestrate DoS attacks.
Over 90,000 D-Link NAS Devices Are Under Attack
Threat actors are targeting a high severity vulnerability in close to 100,000 legacy D-Link devices
Vital Flaws Go away 92,000 D-Hyperlink NAS Gadgets Susceptible to Malware Assaults - AlinaA Cybersecurity World
Apr 09, 2024NewsroomBotnet / Vulnerability Menace actors are actively scanning and exploiting a pair of safety flaws which can be stated to have an effect on as many as 92,000 internet-exposed D-Hyperlink network-attached storage (NAS) gadgets. Tracked as CVE-2024-3272 (CVSS rating: 9.8) and CVE-2...

D-Link RCE Vulnerability That Affects 92,000 Devices Exploited in Wild
Cybercriminals have actively exploited a critical vulnerability in D-Link Network Attached Storage (NAS) devices globally.

Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks
Hackers are exploiting vulnerabilities (CVE-2024-3272 and CVE-2024-3273) in D-Link NAS devices. Up to 92,000 devices affected.
Exploitation Attempts Target Unpatched Flaw Affecting Many D-Link NAS Devices
Unpatched D-Link NAS device vulnerability CVE-2024-3273, potentially affecting many devices, is being exploited in the wild.
Flaws in legacy D-Link NAS devices under attack | TechTarget
A command injection flaw and hardcoded backdoor vulnerability in D-Link NAS devices are under active exploitation.
92,000+ internet-facing D-Link NAS devices accessible via "backdoor" account (CVE-2024-3273) - Help Net Security
A vulnerability (CVE-2024-3273) in four old D-Link NAS models could be exploited to compromise internet-facing devices.
Over 92,000 exposed D-Link NAS devices have a backdoor account
A threat researcher has disclosed a new arbitrary command injection and hardcoded backdoor flaw in multiple end-of-life D-Link Network Attached Storage (NAS) device models.

CVE-2024-22853 : D-LINK GO-RT-AC750 101B03 HARD-CODED PASSWORD - Cloud WAF
CVE-2024-22853 : D-LINK Go-RT-AC750 GORTAC750_A1_FW_v101b03 has a hardcoded password for the Alphanetworks account, which allows remote attackers to obtain root access via a telnet session.