Taiwan Authority: D-Link routers had Telnet backdoor
The Taiwanese IT authority TCERT/CC warns of a discovered vulnerability that makes it possible to break into D-Link routers with a backdoor that the manufacturer itself has not previously reported.
The Taiwan Computer Emergency Response Team/Coordination Center says in a warning that via LAN, attackers can force the router through the backdoor to activate telnet by visiting a specific URL. Attackers can then log in with admin rights.
The Taiwanese authority notified D-Link in April and the manufacturer on Sunday pushed an update to the affected routers. The manufacturer acknowledges the bug. D-Link advises users to check whether the automatic update has been installed.
Fashion model |
Version after update |
Fashion model | Version after update | |
E15 |
v1.20.01 |
R03 | v1.10.01 | |
E30 |
v1.10.02 |
R04 | v1.10.01 | |
G403 |
v1.10.01 |
R12 | v1.10.01 | |
G415 |
v1.10.01 |
R15 | v1.20.01 | |
G416 |
v1.10.01 |
R18 | v1.10.01 | |
M15 |
v1.20.01 & v1.21.01 |
R32 | v1.10.02 | |
M18 |
v1.10.01 |
M30 | v1.10.02 | |
M32 |
v1.10.02 |
M60 | v1.10.02 |