D-Link Releases Patch For Hard-coded Password Vulnerabilities

July 19, 2021

D-Link recently released a firmware hotfix for all affected customers on July 15, after fixing the bugs in the DIR-3040 AC3000 wireless internet router.

Vulnerabilities discovered and reported by Cisco Talos security researcher Dave McDaniel could allow an attacker to execute arbitrary code on unpatched routers and gain access to sensitive information upon successful exploitation.

The Zebra IP Routing Manager of the router and the Libcli Environment functionality contains the vulnerabilities CVE-2021-21818 and CVE-2021-2180, which contain hard encrypted passwords and credentials.

Both of these could allow threat actors targeting D-Link DIR-3040 routers to bypass the authentication rules which are configured by the software administrator.

The five vulnerabilities that D-Link is fixing with the hotfix are CVE-2021-21816, CVE-2021-21817, CVE-2021-21818, CVE-2021-21819, and CVE-2021-21820.

For more information, read the original story in Bleeping Computer.

Top Stories

Related Articles

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn