This come after researcher Craig Heffner of Tactical Network Solutions found a simple hack that would allow some D-Link routers to be breached, bypassing the authentication process.
In a blog post, Heffner detailed how he was able to access the web interface of a D-Link router without any authentication and view or change the device settings.
D-Link said in a statement: “We are proactively working with the sources of these reports as well as continuing to review across the complete product line to ensure that the vulnerabilities discovered are addressed.”
So far, the company has released several security updates that can be downloaded from D-Link’s support site.
The routers in question are consumer grade, but they are used by small to medium-sized businesses, representing a weak link in security that could be exploited by hackers to access company networks.
Read more about router security
- Router backdoors put businesses at risk
- Huawei router security: Is there legitimate cause for concern?
- Alert over Cisco router vulnerability
- Network security 101: Default router settings, network hardening
D-Link said users should download firmware updates as soon as they are available, but called on users to ensure they download the correct firmware update for their particular router.
The company said the hardware revision information can be found on the product label on the underside of the product next to the serial number or on the device web configuration.
Until the security fix is released, there is no way to prevent the devices from being hacked, but D-Link router users are advised to use a strong Wi-Fi password and disable remote administrative access.
The company has also told users to ignore any unsolicited e-mails that relate to security vulnerabilities because they could contain links that allow unauthorised router access.
“Neither D-Link nor its partners and resellers will send you unsolicited messages where you are asked to click or install something,” the company said.
D-Link has not published an official list of affected routers, but according to Heffner, they include model numbers DIR-100, DI-524, DI-524UP, DI-604S, DI-604UP, DI-604+, and TM-G5240.