D-Link Releases Patch For Hard-coded Password Vulnerabilities

D-Link recently released a firmware hotfix for all affected customers on July 15, after fixing the bugs in the DIR-3040 AC3000 wireless internet router.

Vulnerabilities discovered and reported by Cisco Talos security researcher Dave McDaniel could allow an attacker to execute arbitrary code on unpatched routers and gain access to sensitive information upon successful exploitation.

The Zebra IP Routing Manager of the router and the Libcli Environment functionality contains the vulnerabilities CVE-2021-21818 and CVE-2021-2180, which contain hard encrypted passwords and credentials.

Both of these could allow threat actors targeting D-Link DIR-3040 routers to bypass the authentication rules which are configured by the software administrator.

The five vulnerabilities that D-Link is fixing with the hotfix are CVE-2021-21816, CVE-2021-21817, CVE-2021-21818, CVE-2021-21819, and CVE-2021-21820.

For more information, read the original story in Bleeping Computer.

Top Stories

Related Articles

May 31, 2025 A coordinated supply chain attack has compromised between 500 and 1,000 e-commerce websites by exploiting vulnerabilities in 21 more...

May 31, 2025 A widely used open-source Go library, easyjson, used in healthcare, finance and even defence has come under scrutiny more...

May 31, 2025 (EDITORIAL) A messaging tool used by Trump administration officials to archive encrypted Signal messages has been hacked — more...

April 22, 2025 Anthropic, a leading artificial intelligence company, anticipates that AI-powered virtual employees could begin operating within corporate networks as more...

Jim Love

Jim Is and author and pud cast host with over 40 years in technology.