News D-Link refuses to patch yet another security flaw, suggests users just buy new routers — D-Link told users to replace NAS last week

Seems home consumers are just finding out about this and are surprised what end of life means. I remember cisco life time warranty on switches which really means until they decide to declare it dead.

Large enterprise equipment has had this issue for as long as I can remember. But like these dlink router they are basically ewaste. Who is really going to be running a router with 100mbps ports now days. Commercial equipment is generally replaced long before it hits end of life. Most companies dump not long after it hits end of support.

At least they still function even with the hacking risk. There are many devices that will not function without some subscription and the company decides to no longer support it.
 
  • Like
Reactions: thestryker
Show them a middle finger, spread the news of the shameless practice and never buy their products again.
If a product is EOL, support stops. If the product still receives patches, then it is not EOL. You cannot have EOL and still receive support, it's that simple. About time a company sticks to it.
 

OpenWrt​

(or similar opensource ones)

honestly more people need to encourage using no longer supported routers w/ opensource stuff as its a waste to not use em just because official maker stops supporting em when they function perfectly fine.
Most routers with Broadcom processors simply cannot use anything of the sort due to no drivers and modern equipment has shaky support in general. If someone cares about security without big cost they should be running a minipc with pfsense/opnsense and keep wireless behind that.
 
Show them a middle finger, spread the news of the shameless practice and never buy their products again.
You would be doing your self a favour by retiring decade old 100mbit routers, you would probably save money over time energy wise because of the faster network speeds you would be getting.
 
Well, that's understandable from their point of view. I buy mikrotik hardware. It comes from Latvia, so it has eu-oriented privacy inscribed. It does not look do groovy like Asus, d-link, has no fancy antennas but it goes over any openwrt or proprieaty solutions i've seen so far.
 
  • Like
Reactions: iLoveThe80s
Well, that's understandable from their point of view. I buy mikrotik hardware. It comes from Latvia, so it has eu-oriented privacy inscribed. It does not look do groovy like Asus, d-link, has no fancy antennas but it goes over any openwrt or proprieaty solutions i've seen so far.
Would they continue to support 15 year old hardware, long out of warranty, with new software/firmware updates?
That is the issue here with d-link.
 
D-Link says it will not fix security flaw found in routers due to end-of-life concerns and instead suggests users buy new routers. This comes on the heels of the company refusing to fix a security flaw in NAS devices just last week.

D-Link refuses to patch yet another security flaw, suggests users just buy new routers — D-Link told users to replace NAS last week : Read more
years ago when most of these exploits came to owners attention. "Not by D-Link" I did my research and bought an ASUS Router/Switch to replace my D-Link router. I highly recommend to everyone to remove your D-Link equipment and throw it away. Destroy it. Then install a new router. I can recommend an ASUS router based on my research. Since I found that I became a target of several hackers. at which time I disabled my Wireless function of my router. I was able to thwart the hackers with a Open-SSL 2048 bit encrypted string generated on a Linux Computer. The encryption string was again encrypted and placed in an unmounted partition. From there I could mount the partition decrypt the OpenSSL 2048bit encrypted string. then copy/paste into my encrupted string. unavailable to everyone except my own machine as root user. I had no idea how many people waist their time hacking into wireless routers. They form clubs and rank wireless routers that are difficult to hack, then have club members take chances at hacking into your wireless router. Even an unadvertised router is no big deal to these hackers. Looking into the Wireless router logs I get to see which MAC address are unsuccessfully attempting to hack into my router. Becasue ASUS build their router under Linux. I am able to run a script on the logs. Then enter those MAC addresses into my deny lists. This finally reduces my router being hacked to just a once a month issue. you can do this or simply unplug your router and computer when you are away from your environment Unless you are running large repair jobs remotely. I do a lot of file, partition and disk repairs remotely.
 
  • Like
Reactions: anoldnewb
years ago when most of these exploits came to owners attention. "Not by D-Link" I did my research and bought an ASUS Router/Switch to replace my D-Link router. I highly recommend to everyone to remove your D-Link equipment and throw it away. Destroy it. Then install a new router. I can recommend an ASUS router based on my research. Since I found that I became a target of several hackers. at which time I disabled my Wireless function of my router. I was able to thwart the hackers with a Open-SSL 2048 bit encrypted string generated on a Linux Computer. The encryption string was again encrypted and placed in an unmounted partition. From there I could mount the partition decrypt the OpenSSL 2048bit encrypted string. then copy/paste into my encrupted string. unavailable to everyone except my own machine as root user. I had no idea how many people waist their time hacking into wireless routers. They form clubs and rank wireless routers that are difficult to hack, then have club members take chances at hacking into your wireless router. Even an unadvertised router is no big deal to these hackers. Looking into the Wireless router logs I get to see which MAC address are unsuccessfully attempting to hack into my router. Becasue ASUS build their router under Linux. I am able to run a script on the logs. Then enter those MAC addresses into my deny lists. This finally reduces my router being hacked to just a once a month issue. you can do this or simply unplug your router and computer when you are away from your environment Unless you are running large repair jobs remotely. I do a lot of file, partition and disk repairs remotely.
or just stop using routers and buy a mini-pc with lots of 1/2.5/5/10G ports fast multi-core cpu, low cost memory, low cost SSD storage, Opnsense/Adguard/Unbound DNS, plugins galore to secure and enhance you system and quality AP for wifi and I bet the price would be close to a crappy mid range consumer router but less than the top of the range all flash and no substance models and best of all, your not locked out by the manufacturer!
 
2 are very old.
4 were being sold less than 4 years ago:
2020 - https://firewallguide.com/firewall/wired-router/d-link-dsr-250-8-port-gigabit-vpn-router-review/
2021 - https://firewallguide.com/firewall/wired-router/

If you are buying business class hardware, 4 year lifetime is too short.
Two of those 4 were 100mb routers which should have been a giant warning sign in 2020. As for the two 1gb models: the wireless one only has N and both have USB 2.0 ports as the giant warning sign for how old they really are hardware wise. While they may have still been supported (and sold in some areas) they go back to 2012.