{"id":1113,"date":"2020-12-08T16:53:31","date_gmt":"2020-12-08T16:53:31","guid":{"rendered":"http:\/\/zerothcode.com\/blog\/?p=1113"},"modified":"2020-12-08T16:53:31","modified_gmt":"2020-12-08T16:53:31","slug":"warning-critical-remote-hacking-flaws-affect-d-link-vpn-routers","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/warning-critical-remote-hacking-flaws-affect-d-link-vpn-routers\/","title":{"rendered":"WARNING \u2014 Critical Remote Hacking Flaws Affect D-Link VPN Routers"},"content":{"rendered":"<p>Remote Hacking Some widely sold D-Link VPN router models have been found vulnerable to three new high-risk security vulnerabilities, Remote Hacking<\/p>\n<h4>leaving millions of home and business networks open to cyberattacks<\/h4>\n<h4>\u2014even if they are secured with a strong password. Remote Hacking<\/h4>\n<p>which, if exploited, could allow remote attackers to execute arbitrary commands on vulnerable networking devices via specially-crafted requests and even launch denial-of-service attacks.<\/p>\n<p>D-Link DSR-150, DSR-250, DSR-500, and DSR-1000AC and other VPN router models in<\/p>\n<p>the DSR Family running firmware version 3.14 and 3.17 are vulnerable to the remotely exploitable root command injection flaw.<\/p>\n<p>The Taiwanese networking equipment maker\u00a0<a href=\"https:\/\/supportannouncement.us.dlink.com\/announcement\/publication.aspx?name=SAP10195\" target=\"_blank\" rel=\"noopener noreferrer\">confirmed<\/a>\u00a0the issues in an advisory on December 1,<\/p>\n<p>&#8220;From both WAN and LAN interfaces, this vulnerability could be exploited over the Internet,&#8221;<\/p>\n<p>Digital Defense said in a report published today and shared with The Hacker News.<\/p>\n<p>&#8220;Consequently, a remote, unauthenticated attacker with access to the router&#8217;s web interface could execute arbitrary commands as root,<\/p>\n<p>effectively gaining complete control of the router.&#8221;<\/p>\n<p>The flaws stem from the fact that the vulnerable component, the &#8220;Lua CGI,&#8221;<\/p>\n<p>is accessible without authentication and lacks server-side filtering,<\/p>\n<p>thus making it possible for an attacker<\/p>\n<p>\u2014 authenticated or otherwise. Remote Hacking<\/p>\n<div class=\"separator\">\n<figure style=\"width: 728px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thehackernews.com\/images\/-EHwx9NofrwI\/X89uQNbpC0I\/AAAAAAAABL4\/myx-_WwjqhYuGgVm0vGB7imA_--2YQmkwCLcBGAsYHQ\/s0\/read.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/thehackernews.com\/images\/-EHwx9NofrwI\/X89uQNbpC0I\/AAAAAAAABL4\/myx-_WwjqhYuGgVm0vGB7imA_--2YQmkwCLcBGAsYHQ\/s0\/read.jpg\" alt=\"Remote Hacking\" width=\"728\" height=\"700\" border=\"0\" data-original-height=\"700\" data-original-width=\"728\" \/><\/a><figcaption class=\"wp-caption-text\">Remote Hacking<\/figcaption><\/figure>\n<\/div>\n<p>A separate vulnerability reported by Digital Defense concerns the modification of the router configuration file to inject rogue CRON entries and execute arbitrary commands as the root user.<\/p>\n<p>&#8220;The device uses a plain text config, which is the design to directly edit and upload the config to the same DSR devices accordingly,&#8221;<\/p>\n<p>&#8220;The device uses a plain text config, which is the design to directly edit and upload the config to the same DSR devices accordingly,&#8221;<\/p>\n<p>the company said. Remote Hacking<\/p>\n<h4>&#8220;If D-Link mitigates issue #1 and #2, as well as other, Remote Hacking<\/h4>\n<h4>&#8220;If D-Link mitigates issue #1 and #2, as well as other, Remote Hacking<\/h4>\n<p>recently reported issues, the malicious user would need to engineer a way of gaining access to the device to upload a configuration file,<\/p>\n<p>With the unprecedented rise in work from home as a result of the COVID-19 pandemic,<\/p>\n<p>more employees may be connecting to corporate networks using one of the affected devices, Digital Defense cautioned.<\/p>\n<p>As organizations have scrambled to adapt to remote work and offer secure remote access to enterprise systems,<\/p>\n<p>the change has created new attack surfaces,<\/p>\n<p>with flaws in VPNs\u00a0becoming popular targets for attackers to gain entry into internal corporate networks.<\/p>\n<p>It&#8217;s recommended that businesses using the affected products apply the relevant updates as and when they are available.<\/p>\n<p>It&#8217;s recommended that businesses using the affected products apply the relevant updates as and when they are available.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Remote Hacking Some widely sold D-Link VPN router models have been found vulnerable to three new high-risk security vulnerabilities, Remote<\/p>\n","protected":false},"author":1,"featured_media":1114,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[37],"tags":[],"yst_prominent_words":[],"class_list":["post-1113","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hackers-news"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/1113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=1113"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/1113\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/1114"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=1113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=1113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=1113"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=1113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}