117
you are viewing a single comment's thread
view the rest of the comments
[-] JustARegularNerd@lemmy.world 10 points 6 months ago

I'm still learning Cybersec in general, if I'm reading this right, were these credentials hardcoded in by D-Link, these devices reached EOL, and so they refuse to remove that backdoor on the basis that the devices are EOL?

Is there a likely reason that these were left in, like could it have been a development oversight, or does it look more likely that this was malicious?

Regardless, I definitely hold the opinion that D-Link should do the right thing for their customers and patch that vulnerability, regardless of the device being EOL, similar to how Microsoft pushed a security update to Windows XP re WannaCry when it was EOL, on the basis that "Yes, XP is unsupported and you shouldn't use it, but we are patching this particular vulnerability anyway."

[-] protozoan_ninja@sh.itjust.works 4 points 6 months ago

D-Link suck, they probably just overlooked it. Consumer-grade router manufacturers generally have abysmal/terrifying software QA. One prominent reason I recommend picking up hardware that supports an open router firmware.

this post was submitted on 07 Apr 2024
117 points (99.2% liked)

Cybersecurity

5507 readers
411 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS