• Pika
    link
    fedilink
    English
    19
    edit-2
    8 months ago

    It’s weird that DLINK’s response was basically “tough shit buy our newer product we don’t work on those anymore” especially given the extent of the attack.

    • @AnUnusualRelic
      link
      English
      98 months ago

      Hasn’t that been basically been those domestic network appliance vendors’ answer to most such problems?

  • @Dust0741
    link
    English
    118 months ago

    Is there a nice up to date list of companies like this that have clearly little desire to improve security or are just very anti consumer?

    • @AnUnusualRelic
      link
      English
      6
      edit-2
      8 months ago

      They’re all like that. Unless it’s enterprise grade gear, which has a much longer support plan (although this kind of thing can happen there as well). It’s a classic with domestic network gear.

      Your way out is to replace the original firmware with an open source one if possible. Of course if you buy a brand new model, you don’t know if it’s going to eventually be supported.

      For nas specifically, synology is usually fairly reliable, or you can build your own with one of several specialised system distributions, such as Truenas (there are several others). It may require a bit of learning, depending on how familiar you are with computing and networking.

      • @Dust0741
        link
        English
        38 months ago

        Cool. My rule of thumb of only buying products that either are open source or can have open source firmware and software is sticking.

        • @AnUnusualRelic
          link
          English
          28 months ago

          That’s really the only reasonable way to go nowadays.

  • @JustARegularNerd
    link
    English
    108 months ago

    I’m still learning Cybersec in general, if I’m reading this right, were these credentials hardcoded in by D-Link, these devices reached EOL, and so they refuse to remove that backdoor on the basis that the devices are EOL?

    Is there a likely reason that these were left in, like could it have been a development oversight, or does it look more likely that this was malicious?

    Regardless, I definitely hold the opinion that D-Link should do the right thing for their customers and patch that vulnerability, regardless of the device being EOL, similar to how Microsoft pushed a security update to Windows XP re WannaCry when it was EOL, on the basis that “Yes, XP is unsupported and you shouldn’t use it, but we are patching this particular vulnerability anyway.”

    • @[email protected]
      link
      fedilink
      English
      48 months ago

      D-Link suck, they probably just overlooked it. Consumer-grade router manufacturers generally have abysmal/terrifying software QA. One prominent reason I recommend picking up hardware that supports an open router firmware.

  • @[email protected]
    link
    fedilink
    English
    78 months ago

    Well I’ll add D-Link to my ‘never buy’ list. Not just for their crappy response, but for the poor security practices used in a networked product in the first place!

  • @esc27
    link
    English
    18 months ago

    deleted by creator