• February 23, 2025, 04:29:01 AM
  • Welcome, Guest
Please login or register.

Login with username, password and session length
Advanced search  

News:

This Forum Beta is ONLY for registered owners of D-Link products in the USA for which we have created boards at this time.

Author Topic: WiFi Protected Setup PIN brute force vulnerability - Is DIR-600 vulnerable?  (Read 7344 times)

Random Regular

  • Level 1 Member
  • *
  • Posts: 1

I have a DIR-600 C1 running the latest available firmware version (3.03).

Model: DIR-600
Hardware Version: C1
Firmware Version: 3.03

WiFi Protected Setup is turned ON.

I would like to know if it is affected by the new disclosed vulnerability described here: http://www.kb.cert.org/vuls/id/723755

Also, turning WiFi Protected Setup OFF may not help to mitigate this vulnerability, according to this article: http://arstechnica.com/business/news/2012/01/hands-on-hacking-wifi-protected-setup-with-reaver.ars

Thank you for your attention.
« Last Edit: January 04, 2012, 04:46:13 PM by Random Regular »
Logged

FurryNutz

  • Poweruser
  •   ▲
    ▲ ▲
  • *****
  • Posts: 49923
  • D-Link Global Forum Moderator
    • Router Troubleshooting

I would contact a level 2 tech at Dlink support and ask this question.

Let us know what they say.
Logged
Cable: 1Gb/50Mb>NetGear CM1200>DIR-882>HP 24pt Gb Switch. COVR-1202/2202/3902,DIR-2660/80,3xDGL-4500s,DIR-LX1870,857,835,827,815,890L,880L,868L,836L,810L,685,657,3x655s,645,628,601,DNR-202L,DNS-345,DCS-933L,936L,960L and 8000LH.

FurryNutz

  • Poweruser
  •   ▲
    ▲ ▲
  • *****
  • Posts: 49923
  • D-Link Global Forum Moderator
    • Router Troubleshooting
Logged
Cable: 1Gb/50Mb>NetGear CM1200>DIR-882>HP 24pt Gb Switch. COVR-1202/2202/3902,DIR-2660/80,3xDGL-4500s,DIR-LX1870,857,835,827,815,890L,880L,868L,836L,810L,685,657,3x655s,645,628,601,DNR-202L,DNS-345,DCS-933L,936L,960L and 8000LH.