Research reveals multiple vulnerabilities in D-Link home routers

D-Link is one of the leading router manufacturer and has a good customer base.

In the time of pandemic their has been a rise in work from home count and their are several people using routers for long period of times to stay connected and work for their organizations. Hackers have started targeting D-Link routers to exploit vulnerabilities and use it for their benefits.

The vulnerabilities exploited include CVE-2020-13782 – Malicious Code Injection, CVE-2020-13786 – CSRF, CVE-2020-13785– Lack of Encryption, CVE-2020-13784 – Calculating Session Cookies, CVE-2020-13783 – Plain Text Password, CVE-2020-13787– Weak Wifi Protocol.

These vulnerabilities can be used together to run arbitrary commands, exfiltrate data, upload malware, delete data, or steal user credentials. These attacks are easiest to conduct if the router is set up to use HTTP, but a sophisticated attacker can still calculate the required session information if the router uses HTTPS.

To prevent such attacks it is suggested to keep your network traffic encrypted as it can prevent session highjacking attacks. Since the pandemic has struck the world the usage of home networks via routers has increased exponentially and if the hacker are able to highjack the network it can cause huge menace.

D-Link DIR-865L is the router placed under surveillance as it has most of the above listed vulnerabilities. There is a beta patched released for the vulnerabilities but it has to be manually configured which is not feasible for most of the users with less knowledge about it.

NPAV requests users to not use the above listed router to share any kind of sensitive information for the the time being. The information shared can be misused by hackers to benefit from it and can cost you a lot.

Use NPAV and join us on a mission to secure the cyber world.

Sharing is caring!

Leave a Reply

Your email address will not be published. Required fields are marked *

*