Geheimnisse sehen aus wie deine magische Fantasie
Abonniere Nintendo Life auf YouTube. Weitere Neuigkeiten für physische Switch-Sammler, Abonniere Nintendo Life auf YouTube. Weitere Neuigkeiten für physische Switch-Sammler, Abonniere Nintendo Life auf YouTube. Weitere Neuigkeiten für physische Switch-Sammler, Abonniere Nintendo Life auf YouTube. Weitere Neuigkeiten für physische Switch-Sammler. This is due to a severe vulnerability that affects the devices that goes under the CVE-ID of CVE-2021-45382. This is a remote command execution (RCE) vulnerability and it’s not likely to get patched by D-Link and is considered serious enough that these devices should be taken offline post-haste. The vulnerability would allow an attacker to take over these devices using “diagnostic hooks” in the ncc2 service, which is tied to the DDNS function and would allow an attacker to gain full access by injecting malicious code.
Proof of concept code already exists on GitHub, which makes the likelihood of this attack vector being used even more likely. The known affected devices so far are the D-Link DIR-810L, DIR-820L/LW, DIR-826L, DIR-830L, and DIR-836L and all hardware revisions are affected. Most of these routers were released around 2012 zu 2014 and are either 802.11n or 802.11ac devices based on what appears to be Realtek or Ralink (now MediaTek) Hardware. These aren’t the only devices that CISA has given advice on recently, as the D-Link DIR-610 and DIR-645, as well as the Netgear DGN2200 are also devices that CISA recommends retirement for.