computer Security

6 New Critical Vulnerabilities Found in D-Link Routers let Hackers Launch Remote Attacks

Recently, the security experts at Palo Alto Networks has identified 6 new critical vulnerabilities in the DIR-865L model of D-Link routers, which allows the attackers to launch cyberattacks remotely.

DIR-865L model router was initially released in 2012, and it’s no longer supported in the United States, nor in Europe as the status of this product is already termed as dropped. In short, this model has already been discontinued and can no longer be purchased, but still supported by the manufacturer.

That’s why D-Link has released a firmware update that fixes three of the six vulnerabilities that were detected in the DIR-865L wireless router. One of the uncorrected vulnerabilities is critical, and the other two are dangerous. 

By exploiting these security flaws, an attacker can easily execute arbitrary commands, steal confidential information, download malware, or even delete data as well.

According to the report, 42 security experts at Palo Alto Networks have discovered these critical vulnerabilities in the D-Link DIR-865L at the end of February and reported them to the manufacturer. 

6 Critical Security Flaws

Here are the 6 security flaws discovered by the security experts at Palo Alto Networks:-

  • CVE-2020-13782: Improper Neutralization of Special Elements Used in a Command (Command Injection)
  • This security flaw was rated 9.8 on the CVSS scale by the security experts, and this security flaw is not yet fixed.
  • This security flaw was rated 8.8 on the CVSS scale by the security experts, and this security flaw is fixed.
  • This security flaw was rated 7.5 on the CVSS scale by the security experts, and currently, this security flaw is fixed.
  • This security flaw was rated 7.5 on the CVSS scale by the security experts, and currently, this security flaw is not yet fixed.
  • This security flaw was rated 7.5 on the CVSS scale by the security experts, and currently, this security flaw is fixed.
  • This security flaw was rated 7.5 on the CVSS scale by the security experts, and this security flaw is not yet fixed.

Although the vulnerability of command injection received a critical assessment of danger from the NVD (National Vulnerability Database), but authentication is required to use it. 

According to one of the security researchers, combining some of these vulnerabilities could allow the attackers to intercept the network traffic and steal session cookies for later use.

In this way, the attackers can easily gain access to the administrative portal for file sharing, which enables them to download arbitrary malicious files, download confidential files, or delete sensitive data on the affected device, as we told earlier. 

Moreover, they can also use the stolen cookies to launch arbitrary commands and launch DoS (Denial-of-service) attacks. Apart from this, D-Link quickly acted and responded to the information provided by the security experts, and released a beta version of the firmware, in which only three vulnerabilities were fixed that we have mentioned above. 

Also Read:

GhostDNS Router Exploit Kit Source Code Leaked to Antivirus Company

Muhstik Botnet Attack & Harvests Vulnerable Linux-based Tomato Routers To Perform DDOS Attacks

Balaji N

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Palo Alto Networks PAN-OS Zero-day Under Active Attack

In a recent security alert, Palo Alto Networks has disclosed a critical vulnerability within its…

1 day ago

DuckDuckGo Launches Privacy Pro : 3-In-1 Service With VPN

DuckDuckGo is a search engine that takes users' privacy seriously. It does not track or…

1 day ago

Wiz to Acquire Gem Security for $350M to Address Cloud Security

Wiz, a leading cloud security company, has announced its acquisition of Gem Security for $350…

1 day ago

Critical Bitdefender Vulnerabilities Let Attackers Gain Control Over System

Bitdefender GravityZone Update Server (versions 6.36.1, Endpoint Security for Linux 7.0.5.200089, and Endpoint Security for…

1 day ago

Ukrainian Hackers Hijacked 87,000 Sensors to Shut down Sewage System

Ukrainian hackers have successfully infiltrated and disabled a vast network of industrial sensors and monitoring…

1 day ago

Zscaler Acquires Airgap Networks to Enhance Zero Trust SASE

Zscaler has announced the acquisition of Airgap Networks, a company renowned for its agentless segmentation…

1 day ago