• Home Support Forums Security Advisories Shop     English | French
Support Announcement
D-Link DSL-2740R Rev.Ax / DSL-2640B Rev. Tx / DSL-2780B Rev.Ax / DSL-526B Rev. Bx (non-US product and/or firmware) :: Unauthenticated Remote DNS Change Vulnerability (DNSChanger)

Overview

The following was originally posted by D-Link in Dec. 2016. This announcement has been updated in regards to the latest information published on April 4, 2019, regarding DNSChanger Malware.

In December of 2016, Tom’s Guide published a report discussing “a new malvertising campaign attacking at least 166 models from multiple manufacturers.”

While there was evidence that the malware was targeting 166 distinct router models, only a few were identified. One of the identified models was the D-Link DSL-2740R. D-Link has previously offered firmware patches for this.

 

D-Link has been made aware of a new post by a third party, which expands the scope of the identified products and firmware patches, naming the D-Link DSL-2640B, D-Link DSL-2780B, and D-Link DSL-526B. These products are not sold in the US.

 

Accreditation and Coordination

(12/2016) : http://www.tomsguide.com/us/malvertising-router-attack,news-24034.html

Additional internet news posts from 2016 includes:

(04/04/2016) :https://badpackets.net/ongoing-dns-hijacking-campaign-targeting-consumer-routers/

Troy Mursch : badpackets.net/author/badpackets/

Exploit-DB:

DSL-2640B / Hardware Rev. T1 / Firmware GE_1.07 / Non-US : Link

DSL-2740R / Hardware Rev. Ax  / Firmware EU_1.15 / Non-US : Link

DSL-2780B / Hardware Rev. Ax / Firmware DLINK_1.01.14 / Non-US : Link

DSL-526B / Hardware Rev. Bx / Firmware AU_2.01 / Non-US : Link

Additional internet news posts from 2019 includes:

Affected Product Models and Patches:

The products named in the most recent report are deployed with firmware not offered in the US and not posted on http://support.dlink.com. In addition, some of these models are deployed directly from carriers using certified and custom configurations.  

 

If you received any of these devices from your carrier, please contact them directly for patches.

The firmware post is US firmware that is adapted for Specific Regional DSL deployments. It is recommended that you contact your regional D-Link Customer Care for specific fixes. By using firmware that is not intended for your region or carrier, you place your device and information at risk and may even disable the device in doing so.

  

Model Hardware Revision  RegionAffected FW Fixed FW  Last Updated
DSL-526B All Revision B AustraliaAU v2.01 and older (lower) Under Investigation

04/05/2019

DSL-2640B All Revision T MalaysiaGE v1.07 and older (lower) Under Investigation

04/05/2019

DSL-2740R All Revision A EuropeEU v1.15 and older (lower) http://tsd.dlink.com  EU_1.17

01/2015

DSL-2780B All Revision A AU/NZ/EU v1.01.14 and older (lower) Under Investigation 04/05/2019

 

 

Options for D-Link Routers and Gateways that are no longer supported or are under investigation :

 

    1. Contact your DSL Service Provider or Regional D-Link Customer Care for latest information and patches.

    2. Perform a factory reset on the device using its web-configuration interface at http://192.168.0.1. Then, set a new, unique password, and complete the setup for your DSL carrier.

    3. Modify the device through its web-configuration interface at http://192.168.0.1, and manually set the Domain Name Server (DNS) values. Instructions can be found in the device’s User Manual here):

 

         - Google DNS : 8.8.8.8 or 8.8.4.4

         - Cloudflare DNS: 1.1.1.1

Regarding Security Patches for your D-Link Devices

Firmware updates address any potential security vulnerabilities in affected D-Link devices. D-Link will continually update this and strongly recommends that all users install the relevant updates.

As there are different hardware revisions on our products, please check your device to ensure you download the correct firmware update. The hardware revision information can usually be found on the product label on the underside of the product next to the serial number. Alternatively, it can also be found on the device web configuration.