If the devices are taken over, the attackers will have complete control over them and may use them to launch other attacks like distributed denial-of-service (DDoS) attacks. The aforementioned vulnerabilities are used by the attack attempts used to propagate MooBot that were discovered by Unit 42 researchers.
Despite the fact that D-Link has released security bulletins about every vulnerability listed here, some users may be using outdated or unpatched software or hardware. Read More…