D-Link is aware of the Talos vulnerability disclosure regarding a malware known as VPNFilter.
The original disclosure is posted at the following links:
D-Link is aware of the Talos Vulnerability disclosure update released Wednesday, June 6, 2018. This update expands the accused products from a variety of companies that may be affected.
The following D-Link products have been accused:
- DES-1210-08P
- DIR-300
- DIR-300A
- DSR-250N
- DSR-500N
- DSR-1000
- DSR-1000N
D-Link appreciates Talos Intelligence from Cisco Systems, Inc. for disclosing this update, however it does not have much detail to identify hardware revisions or firmware affected.
Since the first disclosure report, D-Link continues to research the malware and the potential threats it could mean to our customers.
The best intelligence currently is the VPNFilter malware attempts to use known vulnerabilities/exploits during a device attack.
We strongly encourage owners of D-Link products to frequently check for device firmware updates at http://support.dlink.com (for US), your region's local D-Link Office customer-care, or D-Link Mobile Applications.
For the Talos accused products, we are providing links to the latest device firmware.
To ensure your system is completly updated, we recommend to upgrade to the latest firmware, reset the device to factory default settings (factory reset), and complete it's installation/setup steps.
Security patch for your D-Link Devices
D-Link will update this annoucement continually.
As there are different hardware revisions on our products, please check this on your device before downloading the correct corresponding firmware update. The hardware revision information can usually be found on the product label on the underside of the product next to the serial number. Alternatively, they can also be found on the device web configuration.