TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

D-Link says it won't patch 60k older modems

267 pointsby lobo_tuerto6 months ago

29 comments

autoexec6 months ago
Here&#x27;s an article for those who&#x27;d rather read than watch someone&#x27;s youtube video:<p><a href="https:&#x2F;&#x2F;www.techradar.com&#x2F;pro&#x2F;security&#x2F;d-link-says-it-wont-patch-60-000-older-modems-as-theyre-not-worth-saving" rel="nofollow">https:&#x2F;&#x2F;www.techradar.com&#x2F;pro&#x2F;security&#x2F;d-link-says-it-wont-p...</a><p>Dlink has a long history of putting out insecure and even backdoored devices and so anyone with a dlink device is probably better off buying something different
评论 #42252311 未加载
评论 #42252693 未加载
评论 #42256818 未加载
评论 #42251887 未加载
ak2176 months ago
If anyone is looking for alternatives as far as long term supported products go... I&#x27;ve had nothing but good experiences with Ubiquiti (Unifi) and OpenWRT. At the lower end of the price spectrum, OpenWRT supported devices can be an incredible value, and most will probably remain supported for decades to come.<p>More broadly, it&#x27;s not just about the support commitment but also about the company&#x27;s reputation for shipping solid software. i.e. what is the prior on a scenario like this after the product goes EOL.
评论 #42252594 未加载
评论 #42253739 未加载
评论 #42252859 未加载
评论 #42252419 未加载
评论 #42256352 未加载
评论 #42256008 未加载
评论 #42252815 未加载
mitjam6 months ago
This is something the EU Product Liability Directive potentially addresses. It demands that vendors (or importers) of products need to update their product if that&#x27;s required to keep them secure. Otherwise they are liable for damages, even psychological damages.<p>There is no specific duration mentioned in the directive, so it&#x27;s probably best from a vendor point of view to add product lifetime info to the product description or the contract, up front.<p>In Germany there is something similar in place, already and the expectation is that products (and necessary apps to run the products) need to be updated for 5 years on average.
评论 #42255558 未加载
评论 #42255557 未加载
smitelli6 months ago
Background on the underlying context of the bug: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=-vpGswuYVg8" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=-vpGswuYVg8</a> -- It&#x27;s objectively unforgivable.
评论 #42251970 未加载
alias_neo6 months ago
I&#x27;ve had a box of old wifi-routers for years that I&#x27;d been meaning to reverse engineer and write up blog posts on the vulnerabilities to educate people on just how poor quality the software is written for the things you buy in your local electronics store. Every 3-4 years I&#x27;d have to buy another because the manufacturer stopped providing updates, even when I was buying their higher-end stuff.<p>I myself moved on to an Ubiquiti Edge Router almost 10 years ago, but Ubiquiti didn&#x27;t do a great job of that in the long term and they ditched the EdgeRouter&#x2F;EdgeMAX line so I ended up (and I wasn&#x27;t interested in Unifi line for my router&#x2F;firewall) buying a Protectli box, flashed coreboot and used pfSense for a while before eventually moving to OPNSense.<p>I came to the conclusion over this time that any consumer network equipment is basically junk and if you care at all about security you shouldn&#x27;t use it; sadly that&#x27;s easier said than done for non-techy folks.<p>Many pieces of older&#x2F;cheaper hardware can be flashed with OpenWRT and I&#x27;d recommend that as the cheapest option for anyone who cares just a little, and doesn&#x27;t want to buy new hardware, and for everyone who really wants to make an effort should buy some hardware that can run a properly maintained router OS like pfSense or OPNSense, even an all-in-one wifi-router-switch if you don&#x27;t want to build out an entire SMB network.
评论 #42257586 未加载
486sx336 months ago
Or well… if you have one of these models, this is the way.<p><a href="https:&#x2F;&#x2F;openwrt.org&#x2F;toh&#x2F;d-link&#x2F;start" rel="nofollow">https:&#x2F;&#x2F;openwrt.org&#x2F;toh&#x2F;d-link&#x2F;start</a>
评论 #42252800 未加载
tptacek6 months ago
Look I am just being grumpy about this and I know it has nothing really substantive to do with the underlying story, which is D-Link EOL&#x27;ing products, but: there is <i>really</i> no such thing as a &quot;9.8&quot; or &quot;9.2&quot; vulnerability; there is more actual science in Pitchfork&#x27;s 0.0-10.0 scale than there is in CVSS.
评论 #42254487 未加载
fresh_broccoli6 months ago
It&#x27;s a shame that MikroTik routers&#x27; UI is completely unsuitable for non-powerusers.<p>Otherwise they would be perfect. Cheap and supported practically forever. Their trick seems to be that they use a single firmware image for all routers with the same CPU architecture.
评论 #42254178 未加载
评论 #42251962 未加载
评论 #42253004 未加载
wuming26 months ago
Wasteful choice enabled by not being entirely responsible for pollution, energy consumption and trash. If they had to pay for environmental full restoration, energy at full cost and careful disposal of unsuitable hardware decision would have been different.
评论 #42254932 未加载
zahlman6 months ago
To be fair, CVE scores generally don&#x27;t seem very useful in assessing the real impact of a security vulnerability. The CUPS thing was a 9.9 and that was completely irrelevant for a large swath of people.
评论 #42252486 未加载
评论 #42253657 未加载
评论 #42251597 未加载
评论 #42255380 未加载
评论 #42251925 未加载
slimebot806 months ago
Most &quot;Critical&quot; thing is: you buy a new router that is not from Duh-Link.
guidedlight6 months ago
I remember this happened before, and someone smarter than me exploited the vulnerability to access every router and patch it remotely.
markhahn6 months ago
how about this: you can only abandon hardware if you enable open firmware on it.
ChrisArchitect6 months ago
Related:<p><i>D-Link tells users to trash old VPN routers over bug too dangerous to identify</i><p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=42201639">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=42201639</a>
clwg6 months ago
Just opensource the firmware and redirect the update url.
评论 #42251596 未加载
评论 #42255690 未加载
isodev6 months ago
Can&#x27;t there be a law that says something like &quot;you can&#x27;t release new hardware while you have unpatched older hardware still in use&quot;? Recall or update your stuff first, release new things second.
评论 #42253097 未加载
评论 #42253443 未加载
评论 #42253023 未加载
znkynz6 months ago
D-Link says buy a new router after vulnerability emerges after the signposted end of support date.
评论 #42252003 未加载
pt_PT_guy6 months ago
One of the reasons why there are major security f-ups: no accountability and no consequences
pcl6 months ago
I see a lot of comments here recommending OpenWRT. I’ve been happy with it in some deployments, but also don’t overlook the alternatives! I just had a wonderful experience with Fresh Tomato repurposing an integrated router &#x2F; AP &#x2F; 4-port switch as a multi-WAN router.<p>It would have been doable with OpenWRT’s robust scripting support, but was just a few clicks in the UI with Fresh Tomato.<p><a href="https:&#x2F;&#x2F;freshtomato.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;freshtomato.org&#x2F;</a><p><a href="https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Tomato_(firmware)" rel="nofollow">https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Tomato_(firmware)</a>
dmix6 months ago
Not downplaying the risks, but could a vulnerability on a d-link router really let you monitor traffic on the device in a practical sense (as mentioned in the video)? Assuming it is non-SSL is there enough computing power to even do any meaningful monitoring and subsequent exfiltration? Or are the SOCs used on them powerful enough these days.
评论 #42251580 未加载
DocTomoe6 months ago
„Just buy a new modem“ they say … sure won’t be a D-Link ever again.
chipweinberger6 months ago
The D-Link DSR-150 was released in 2012<p>It was the first information I wanted to know, but it wasn&#x27;t in the article.
a1o6 months ago
Any good router access point that has nice gigabit Ethernet and really good WiFi, for a second access point in the house?
sitkack6 months ago
I could see them facing criminal liability here. Someone is having hard conversations with their insurance company.
o11c6 months ago
Discussion around this seems very confused; there are quite a few severe vulnerabilities this year in various products (routers and NASes).<p><a href="https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-3273" rel="nofollow">https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-3273</a> <a href="https:&#x2F;&#x2F;supportannouncement.us.dlink.com&#x2F;security&#x2F;publication.aspx?name=SAP10383" rel="nofollow">https:&#x2F;&#x2F;supportannouncement.us.dlink.com&#x2F;security&#x2F;publicatio...</a> (April 4) affects NASes (DNS-* products, same as one of the November vulnerabilities), no fix, official recommendation &quot;buy a new one&quot;.<p><a href="https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-45694" rel="nofollow">https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-45694</a> <a href="https:&#x2F;&#x2F;supportannouncement.us.dlink.com&#x2F;security&#x2F;publication.aspx?name=SAP10412" rel="nofollow">https:&#x2F;&#x2F;supportannouncement.us.dlink.com&#x2F;security&#x2F;publicatio...</a> (September 16) affects routers (DIR-* products), fix by upgrading frimware<p><a href="https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-10914" rel="nofollow">https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-10914</a> <a href="https:&#x2F;&#x2F;supportannouncement.us.dlink.com&#x2F;security&#x2F;publication.aspx?name=SAP10413" rel="nofollow">https:&#x2F;&#x2F;supportannouncement.us.dlink.com&#x2F;security&#x2F;publicatio...</a> (November 6) affects NASes (DNS-* products), no fix, official recommendation &quot;buy a new one&quot; (despite not selling NASes anymore?).<p>CVE-2024-10915 looks to be identical to CVE-2024-10914 at a glance<p><a href="https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-11066" rel="nofollow">https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-11066</a> <a href="https:&#x2F;&#x2F;supportannouncement.us.dlink.com&#x2F;security&#x2F;publication.aspx?name=SAP10414" rel="nofollow">https:&#x2F;&#x2F;supportannouncement.us.dlink.com&#x2F;security&#x2F;publicatio...</a> (November 11) affects routers (DSL* products), no fix, official recommendation &quot;buy a new one&quot;. Note that you need to look at multiple CVEs to get the full picture here.<p>(no CVE?) <a href="https:&#x2F;&#x2F;supportannouncement.us.dlink.com&#x2F;security&#x2F;publication.aspx?name=SAP10415" rel="nofollow">https:&#x2F;&#x2F;supportannouncement.us.dlink.com&#x2F;security&#x2F;publicatio...</a> (November 18) affects routers (DSR-* products), no fix, official recommendation &quot;buy a new one&quot;.<p>(several other RCEs require login first, and I could not find an associated login vulnerability. Additionally there are several buffer overflows that theoretically could become an RCE)
Uptrenda6 months ago
Yeah, this doesn&#x27;t surprise me one bit. The number of vulns that get patched in home routers is staggering (D-Link is particularly shit-tier and known for this.) If there&#x27;s that many vulns being fixed then imagine the backlog of unfixed vulns... Then imagine how many legitimate issues have to be hand-waved away because engineers know there&#x27;s no way in hell they&#x27;ll ever get the time to fix them. And have to prioritize the worst problems.<p>It kind of surprises me that you can just release a commercial product that is dangerous, make tons of money from it, then totally refuse to fix any problems with it. These devices are going to sit on innocent peoples networks who deserve to have privacy and security like anyone else. It&#x27;s not outside the realm of possibly that an owned device leads to crypto extortion which leads to a business going under. Or maybe someone&#x27;s intimate pics get stolen and that person then... yeah. Security has a human cost when its done badly.
seam_carver6 months ago
Huh I recently retired all my Dlink routers as soon as they stopped getting security updates, lucky me.
评论 #42259615 未加载
TheRealPomax6 months ago
I mean... yes? &quot;we no longer support these&quot; devices were hit with critical vulnerabilities, and that&#x27;ll never get patched, just like any other device that hit EOL.<p>You knew your device was no longer supported and would no longer receive security updates, &quot;someone found an exploit&quot; is kind of a given, and &quot;d-link won&#x27;t patch it&quot; equally so?
评论 #42251918 未加载
评论 #42252002 未加载
likeabatterycar6 months ago
I cannot identify who the aggrieved parties are, aside from bandwagoning D-Link haters.<p>These devices are end of life. Anyone running an EOL device doesn&#x27;t care about security and probably wouldn&#x27;t update the firmware if it was available.<p>For comparison, Apple does not update EOL devices outside exceptional circumstances. I never received a 20% discount to upgrade.
评论 #42256353 未加载
评论 #42255162 未加载
评论 #42251859 未加载
评论 #42251673 未加载
评论 #42259675 未加载
评论 #42251825 未加载
评论 #42251627 未加载