discovered a backdoor vulnerability (CVE-2013-6027) with certain D-Link routers that allow cyber criminals to alter a router setting without a username or password.
Cracking the Code: Learn How Cyber Attackers Exploit Human Psychology
Ever wondered why social engineering is so effective? Dive deep into the psychology of cyber attackers in our upcoming webinar.Join Now
Last week, D-Link has released new version of Firmware for various vulnerable router models, that patches the unauthorized administrator access backdoor.
Heffner found that the web interface for some D-Link routers could be accessed if the browser's user agent string is set to xmlset_roodkcableoj28840ybtide.
From last month, D-Link was working with Heffner and other security researchers, to find out more about the backdoor and now the Company has released the updates for the following models:
If you receive unsolicited e-mails that relates to security vulnerabilities and prompt you to action, please ignore it. When you click on links in such e-mails, it could allow unauthorized persons to access your router. Neither D-Link nor its partners and resellers will send you unsolicited messages where you are asked to click or install something.NMAP script was also released last month to scan and find the vulnerable routers, you can download it for testing purposes and a Python based proof of concept exploit was also published on pastebin.
Readers strongly recommend to download and install the relevant updates as soon as possible for their network Security and make sure that your wireless network is secure.