D-Link Forums

The Graveyard - Products No Longer Supported => Routers / COVR => DIR-600 => Topic started by: Random Regular on January 04, 2012, 04:38:49 PM

Title: WiFi Protected Setup PIN brute force vulnerability - Is DIR-600 vulnerable?
Post by: Random Regular on January 04, 2012, 04:38:49 PM
I have a DIR-600 C1 running the latest available firmware version (3.03).

Model: DIR-600
Hardware Version: C1
Firmware Version: 3.03

WiFi Protected Setup is turned ON.

I would like to know if it is affected by the new disclosed vulnerability described here: http://www.kb.cert.org/vuls/id/723755

Also, turning WiFi Protected Setup OFF may not help to mitigate this vulnerability, according to this article: http://arstechnica.com/business/news/2012/01/hands-on-hacking-wifi-protected-setup-with-reaver.ars

Thank you for your attention.
Title: Re: WiFi Protected Setup PIN brute force vulnerability - Is DIR-600 vulnerable?
Post by: FurryNutz on January 05, 2012, 07:16:16 AM
I would contact a level 2 tech at Dlink support and ask this question.

Let us know what they say.
Title: Re: WiFi Protected Setup PIN brute force vulnerability - Is DIR-600 vulnerable?
Post by: FurryNutz on January 09, 2012, 07:11:02 AM
http://forums.dlink.com/index.php?topic=45198.0 (http://forums.dlink.com/index.php?topic=45198.0)