• Pika@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    20
    arrow-down
    1
    ·
    edit-2
    7 months ago

    It’s weird that DLINK’s response was basically “tough shit buy our newer product we don’t work on those anymore” especially given the extent of the attack.

  • Dust0741@lemmy.world
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    1
    ·
    7 months ago

    Is there a nice up to date list of companies like this that have clearly little desire to improve security or are just very anti consumer?

    • AnUnusualRelic@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      edit-2
      7 months ago

      They’re all like that. Unless it’s enterprise grade gear, which has a much longer support plan (although this kind of thing can happen there as well). It’s a classic with domestic network gear.

      Your way out is to replace the original firmware with an open source one if possible. Of course if you buy a brand new model, you don’t know if it’s going to eventually be supported.

      For nas specifically, synology is usually fairly reliable, or you can build your own with one of several specialised system distributions, such as Truenas (there are several others). It may require a bit of learning, depending on how familiar you are with computing and networking.

      • Dust0741@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        7 months ago

        Cool. My rule of thumb of only buying products that either are open source or can have open source firmware and software is sticking.

  • JustARegularNerd@lemmy.world
    link
    fedilink
    English
    arrow-up
    10
    ·
    7 months ago

    I’m still learning Cybersec in general, if I’m reading this right, were these credentials hardcoded in by D-Link, these devices reached EOL, and so they refuse to remove that backdoor on the basis that the devices are EOL?

    Is there a likely reason that these were left in, like could it have been a development oversight, or does it look more likely that this was malicious?

    Regardless, I definitely hold the opinion that D-Link should do the right thing for their customers and patch that vulnerability, regardless of the device being EOL, similar to how Microsoft pushed a security update to Windows XP re WannaCry when it was EOL, on the basis that “Yes, XP is unsupported and you shouldn’t use it, but we are patching this particular vulnerability anyway.”

  • PixelTron@lemm.ee
    link
    fedilink
    English
    arrow-up
    7
    ·
    7 months ago

    Well I’ll add D-Link to my ‘never buy’ list. Not just for their crappy response, but for the poor security practices used in a networked product in the first place!