D-Link has confirmed unauthenticated command injection vulnerabilities affecting multiple router models deployed internationally. Active exploitation campaigns using DNS hijacking have been documented since late 2016, with threat actors continuing malicious activities through 2019 and beyond. Multiple D-Link router models remain vulnerable to remote DNS modification attacks through unauthenticated web interfaces. The vulnerabilities allow attackers to […]
The post D-Link Router Command Injection Vulnerability Actively Exploited in the Wild appeared first on Cyber Security News.
This article has been indexed from Cyber Security News
Read the original article: