D-Link
acknowledged information about vulnerabilities in home routers DIR-855 (firmware version A2), DIR-655 (versions from A1 to A4) and DIR-635 (version B).
The problem is the incorrect implementation of the Home Network Administration Protocol (HNAP), which is used for remote control. The network has already laid out the program
HNAP0wn , with which you can intercept remote control of the router with such a vulnerability.
The hole was discovered by experts from the independent company SourceSec (their full report
here ). According to SourceSec, in addition to these models, all routers that have been manufactured by D-Link since 2006 are under suspicion. However, according to the manufacturer’s commentary, none of the above firmware is standard and has never been shipped with new routers, so the danger exists only for those users who have performed the firmware upgrade themselves.
')
If you have doubts about your router, you can use the HNAP0wn program to check.