Overview
The (non-US product) DWR-116 : All Models, Derivative Models, Hardware Revision A1/A2/A3, and All Firmware reached their End-of-Life (EOL)/ End-of-Service Life (EOS) lifecycle. D-Link Corporation and D-Link North America (D-Link Systems, Inc.) recommend that all current users take one or more of the following actions:
1. Transition to a current-generation product.
2. Perform comprehensive data backup.
3. Contact our local regional office for further recommendations or information (LINK).
By standard industry practice, products that have reached EOL/EOS status may no longer receive technical support or firmware updates. Please read the detailed information and recommendations provided below.
3rd Party Report information:
Reported: (Non-US) DWR-116 H/W: 03/10/2025:: Cybersecurity Lab, Department of Cybersecurity, SRM Institute of Science and Technology, Ramapuram, Chennai
Author: Aman Sharma / amansharma _dot_ amsh0208 _at_ gmail _dot_ com
Sathyas6 / Sathyas6 _at_ srmist _dot_ edu _dot_ in
Details: Firmware D-link_DWR-116-V1.00 - the presence of hardcoded root credentials in
the /etc/passwd file and /etc/smbpasswd file within the extracted firmware
Affected Models
Recommendation for EOL /EOS Products
In line with industry practice, D-Link may periodically determine that certain products have reached a stage where further support or development is no longer attainable. This decision may be driven by commonly acknowledged factors such as technology evolution, market requirement, innovation, product efficiency, or the need for product replacement due to superior functionality.
For US Consumers
When a product reaches EOL/EOS status, which we have always announced in advance for an extended period, no further extended support, updates, or development may be available.
We may be unable to address devices or firmware issues for such products, as development and customer support may have been discontinued. If you are outside the US, please contact your regional D-Link office for an inquiry.
We recommend discontinuing such products and caution that continued use may harm other connected devices. If users continue using these devices, please update them to the latest known firmware on the Legacy Website links above. Additionally, users should frequently update a device's unique password to access its web configuration and always have Wi-Fi encryption enabled with a strong and unique password.
Regarding the Security Update for Your Device
Installing firmware updates is critical in addressing security vulnerabilities in your devices. We strongly urge all users to install the relevant updates and regularly check for further updates. After downloading the firmware update, it is essential to ALWAYS validate its success by comparing the firmware version on your product interface to the firmware update version.
Please note that beta software, beta firmware, or hot-fix release is still undergoing rigorous testing before its official release. This ensures it is of the highest quality and meets our stringent standards. Due to such nature, we do not provide express or implied warranties regarding its suitability or usability. It is essential to understand that the user assumes all risk and liability for its use.
NOTE: Our products have different hardware revisions, so please check your device’s hardware revision before downloading the corresponding firmware update. The hardware revision can be found on the product label next to the serial number or on the device's web interface.