Vulnerability Found In D-Link Routers - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

Vulnerability Found In D-Link Routers

Patches are available for the vulnerability, which affects D-Link's consumer-grade routers.

A buffer overflow vulnerability discovered several D-Link wired and wireless routers could allow attackers to execute arbitrary code and potentially compromise entire networks.

eEye Digital Security, an Aliso Viejo, Calif.-based security firm, issued an advisory on the vulnerability Monday. The company had notified D-Link about the flaw in February.

The vulnerability affects the Local Area Network (LAN) interface of several of D-Link's consumer-grade routers, and a company spokesperson said the Fountain Valley, Calif.-based networking vendor has released patches for download on its Web site.

Mike Puterbaugh, vice president of marketing at eEye, said the vulnerability is serious given the widespread use of D-Link routers in small-business and home networks. "The footprint of D-Link's install base is significant, and this could have potentially turned into a big issue," he said.

eEye rated the severity of the flaw as "high." Danish security firm Secunia rated the vulnerability "moderately critical", and Symantec gave the flaw a "10," its highest severity rating.

Attackers could exploit the vulnerability by sending an excessively long M-search string to a device, triggering a stack-based buffer overflow. M-search commands are sent by devices attempting to connect to Universal Plug and Play (UPnP) networks to find other devices on the network, eEye said.

If successful, attackers could gain the ability to execute arbitrary code and apply modified firmware that could eventually allow them to compromise the whole network, according to eEye.

However, attackers would have to have users' wireless settings or administrator password to exploit the flaw, which causes the router to reboot but doesn't create a denial-of-service situation, the D-Link spokesperson said.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Commentary
If DevOps Is So Awesome, Why Is Your Initiative Failing?
Guest Commentary, Guest Commentary,  12/2/2019
Register for InformationWeek Newsletters
Video
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll