DNS settings on some router models by D-Link can be modified without permission via the administration menu, from the web.
For this change and attack, essentially, no authentication is required, and it can be used to redirect them users on malicious online sites, with dangerous scripts or even on phishing pages.
The resulting report was published by Todor Donev, a member of the Bulgarian research team security Ethical Hacker, στόχος της οποίας είναι να καθιερώσει μια κοινότητα επαγγελματιών, που φέρνουν την καινοτομία στον τομέα της ασφάλειας των υπολογιστών.
His research focused mainly on the D-Link DSL-2740R, but according to the report released on Tuesday, other routers from the same manufacturer are affected by this vulnerability. But the researcher did not list the affected devices.
It's unclear if Donev contacted D-Link about the matter, as there's no word on an official release from the company's side about the problem. According to the official websiteσελίδα of the company, the DSL-2740R has been discontinued, meaning it is no longer for sale.
However, although the production of the model has stopped, it can still receive support, since the models being released and used are still covered by the manufacturer's warranty.
Technology DNS, is responsible for the translation of domain to IP addresses of server hosting the websites. If the device is set to connect to one server DNS that manage scammers, the content the user sees will not be normal.