Another Day, Three More D-Link Router Vulnerabilities

It’s been a bad year to own a D-Link router. A few days after a Korean researcher revealed 10 catastrophic vulnerabilities in a single popular D-Link router model, a separate security firm has unearthed three more flaws in three more models, and even provided proof-of-concept exploits.

D-Link's DIR-890L router. Credit: D-Link

(Image credit: D-Link's DIR-890L router. Credit: D-Link)

The similarities run even deeper, as both entities contacted D-Link before going public, but decided that the company was not able to fix router flaws on a user-friendly timescale. D-Link has already patched one of the newfound flaws, but the other two are still very much a risk, and the only surefire way to protect yourself is to use a different router.

The new report comes from Embedi, a Berkeley, California-based security firm that focuses on hardware protection. Researchers at the company discovered three exploitable flaws in D-Link’s DIR-890L, DIR-885L and DIR-895L routers, but believe that other models in the DIR-8XX line are probably also "cruising for a bruising." (The separate flaw we wrote about yesterday involved the DIR-850L model.)

MORE: Best Wi-Fi Routers

First things first: Updating your D-Link router to the latest firmware will solve one problem that Embedi found. (If you’re not sure how to do this, visit the D-Link tech support site and search for your router model.)

Embedi discovered a flaw in the routers’ phpcgi protocol, which — in extremely simple terms — processes authorization requests for the router. By sending a cleverly programmed (but inauthentic) request, researchers were able to suss out a router’s username and password.

However, even though Embedi notified D-Link about the routers’ other problems three months ago, two of the flaws remain unpatched. One of them involves a stack overflow error, which basically just floods the system with nonsense data until it does what the attackers want it to do.

The other flaw — ironically — lets an attacker hijack a router by trying to update firmware in a router’s recovery mode. So maybe it’s not worth updating your firmware just yet.

Since a router controls an entire home network’s internet traffic, it doesn’t take much imagination to expostulate what a hacker could do with these flaws. Intercepting internet traffic — including logins for email, social media and financial institutions — would be simple, as would redirecting queries for popular websites to malicious pages that could steal credentials or inject malware.

Embedi may not have helped matters, as it posted working exploits for each flaw on its Github page.

Tom’s Guide has contacted D-Link for comment on the story, but has not yet received a response.

For now, if you use a D-Link router but have a spare stashed away somewhere, it’s probably better to use your backup. Netgear and Linksys routers aren’t perfect, but they at least have a pretty good track record of patching their flaws in a timely manner.

TOPICS
Marshall Honorof

Marshall Honorof is a senior editor for Tom's Guide, overseeing the site's coverage of gaming hardware and software. He comes from a science writing background, having studied paleomammalogy, biological anthropology, and the history of science and technology. After hours, you can find him practicing taekwondo or doing deep dives on classic sci-fi. 

Latest in Online Security
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
MacBook Pro 2023
New Mac attack is tricking users into thinking their computer is locked — how to stay safe
Hacker using a stolen social security card
Your Social Security number is a literal gold mine for scammers and identity thieves — here’s how to keep it safe
An open lock depicting a data breach
Half a million teachers hit in major data breach with SSNs, financial data and more exposed — what to do now
Green skull on smartphone screen.
Malicious Android apps with 60 million installs bombarding phones with ads and phishing attacks — how to stay safe
Malware
Dangerous new password-stealing trojan automatically reinstalls itself on infected PCs
Latest in News
Nintendo Switch 2
Nintendo Switch 2 rumored specs — here’s what we know so far
iPhone 17 Pro render
iPhone 17 Pro — 7 biggest rumored upgrades
CAD renderings of the Google Pixel 10 Pro XL
Pixel 10 leak could be good news for all Android phones
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
Lewis Hamilton of Great Britain and Scuderia Ferrari looks on during Sprint Qualifying ahead of the F1 Grand Prix of China at Shanghai International Circuit in Shanghai, China, on March 21, 2025. (Photo by Song Haiyuan/Paddocker/NurPhoto via Getty Images)
How to watch Chinese Grand Prix 2025 online – stream F1 without cable, qualifying highlights
NYTimes Connections
NYT Connections today hints and answers — Saturday, March 22 (#650)