D-Link Leaves Millions Vulnerable: Unpatched VPN Router Flaw Exposes Usersto Attack

A critical remote code execution (RCE) vulnerability affecting severalolder D-Link VPN routers remains unpatched, leaving millions of users exposed to potential cyberattacks. The company has explicitly stated it will not release security updates, citing the end-of-life (EOL) status of the affected devices. This decision, announced in a recent security advisory (SAP10415), has sparked concerns among security experts and users alike.

Security researcher delsploit, who initially reported the vulnerability (currently lacking a CVE identifier), identified a stack buffer overflow flaw. This allows unauthenticated remote attackers to executearbitrary code on the affected routers. While technical details remain undisclosed to prevent immediate exploitation, the severity of the vulnerability necessitates immediate action from affected users.

The following D-Link VPN router models, across all hardware and firmware versions, arevulnerable:

  • DSR-150 (EOL May 2024)
  • DSR-150N (EOL May 2024)
  • DSR-250 (Discontinued May 2024)
  • DSR-250N(Discontinued May 2024)
  • DSR-500N (Discontinued September 2015)
  • DSR-1000N (Discontinued October 2015)

D-Link’s official stance, as detailed in their security advisory, is that support and firmware updates cease upon reaching EOL or EOS (end-of-support). This policy, while seemingly standard practice, leaves a significant number of users vulnerable to potentially devastating attacks. The company’s recommendation is a complete device upgrade to newer models.

This inaction is particularly troubling giventhe severity of the RCE vulnerability. The potential consequences for compromised routers include data breaches, network disruption, and complete system takeover by malicious actors.

While D-Link offers a 20% discount on its newer, unaffected DSR-250v2 router as a mitigation strategy, this does littleto address the immediate risk faced by users of the affected models. Furthermore, the company cautions against using third-party open-source firmware, stating that such usage voids warranties and leaves users responsible for any resulting issues.

This marks the second time in a month that D-Link has refused to patch security vulnerabilities inend-of-life products, raising questions about the company’s commitment to responsible security practices and the potential implications for consumer safety. The lack of patching for these widespread vulnerabilities underscores the critical need for users to regularly update their network equipment and prioritize security when purchasing networking hardware. Experts strongly advise users of the affectedrouters to replace their devices immediately.

References:

(Note: Image caption and link included in the original prompt have been incorporated. However, the actual links to the security advisory and news articles should be verified and updated as needed.)


>>> Read more <<<

Views: 0

发表回复

您的邮箱地址不会被公开。 必填项已用 * 标注