Find D-Link software downloads at CNET Download.com, the most comprehensive source for safe, trusted, and spyware-free downloads on the Web. Products purchased in the US that have reached END-OF-SUPPORT (EOS) or cannot be found using Search on this site (support.dlink.com) may have been moved to our Legacy Products site (legacy.us.dlink.com).You can also click here to access our Legacy Products site: D-Link. The DSL-520B ADSL2+ modem router is an affordable high-performance ADSL device for home and the small office. With integrated ADSL2/2+ supporting up to 24Mbps download speed, firewall protection, Quality of Service (QoS) and 1-port switch, this router provides all the essentials that a home or small office needs to establish a secure and high-speed remote link to the outside world. Jan 30, 2014 D-LINK DSL 2750B B1-E1-D1 Firmware Update & adsl+3G Setup DSL+3G وإعداده على DSL-2750B تحديث راوتر - Duration: 11:14. Networking 4 All – احتراف الشبكات 6,264 views.
details: | Wireless AC1900 Dual-Band Gigabit ADSL2+ Router |
hardware type: | DSL Wireless Router |
date added: | 2015-09-06 |

Connect a storage drive to the USB 3.0 or 2.0 ports to effortlessly stream your digital media library to your TV, PC, tablet or mobile device via the built-in DLNA media server.
The router provides ultimate wireless speed with Wireless AC1900 technology which provides combined wireless speeds of up to 1.9 Gbps (1300AC + 600N).
mydlink™ Cloud access and management allows you to effortlessly monitor your network no matter where you are over the Internet, from your iOS, Android and Windows mobile device or a PC with a web browser.
The antennas inside the DSL-3590L have been carefully designed to ensure that you will get little to no dead space in any environment. The high-powered amplifier sends the signal into the furthest corners of your home. Furthermore, the Wireless AC1900 Dual-Band Gigabit ADSL2+ Modem Router’s multiple internal antennas improve wireless reception by adjusting antenna positions to where they are most needed to achieve the best possible performance.
DSL-3590L Features | |
General | |
Street price: | $245 |
LAN / WAN Connectivity | |
WAN port(s) type: | DSL/ISDN/POTS connector (RJ-11) |
LAN ports type: | Gigabit Ethernet (RJ-45) |
USB port(s): | 2 one of the USB ports is USB 3.0 (for storage devices) |
Router | |
Multihomed: | |
Port forwarding: | |
DHCP client: | |
QoS: | |
DSL | |
PPPoE client: | |
Wireless | |
WiFi standards supported: | 802.11a (54 Mbps) 802.11b (11 Mbps) 802.11g (54 Mbps) 802.11n 802.11ac (Wi-Fi 5) |
WiFi modes: | Access point |
WMM (QoS): | |
Dual Band (2.4GHz/5GHz): | |
VPN | |
IPSec | |
L2TP passthrough: | |
PPTP | |
Firewall | |
Device Management | |
Default admin username: | admin |
Administration: | Web-based (LAN) Remote configuration (WAN) Quick Setup Wizard |
Event log: | |
Misc hardware info | |
NTP client: | |
Links | |
Manual: | ftp://ftp.dlink.eu/Products/dsl/dsl-3590... |
Please use the Add Comment function below to review devices you have used (please be descriptive). If you find an error in our database, or have additional information about the product, please ![]()
In a previous post we shared our considerations on the impact of vulnerabilities in Internet connected devices that are EoL. We used the vulnerabilities that we identified in the D-Link DSL-2640B DSL gateway as a use case to support our considerations. In this post we describe the technical details of these vulnerabilities. Before we dive into the technical details, it's important to note that:
The vulnerabilities described in this post may apply to other hardware revisions, other firmware versions and even completely different models. We did not investigate this further and D-Link did not provide any additional insights. The following vulnerabilities are described in this post: We hope we provided sufficient technical details of the identified vulnerabilities. Additional information (e.g. video demonstrations) may be provided in the future. We hope you enjoy the technical remainder of this post! :) CVE-2020-9275 – D-Link DSL-2640B - Remote credentials exfiltrationThis vulnerability allows retrieval of the administrative password by sending a specific UDP packet to port 65002 of the device. An attacker connected to the WiFi or the local LAN, or who is able to reach the internal device interface in any other way, can retrieve the device password with a single Most functionality of the device, including the administration panel and the web server, are implemented in a single process named Communication is done using D-Link's proprietrary protocol for which no information is publicly available. Reversing the Several commands are supported and accessible by specifying the command code in the 2 bytes The command The MAC address check mentioned earlier is not performed for the ![]() In fact, we found this vulnerability using a rather dumb fuzzing campaign. To start, we simply piped Due of the (very) forgiving implementation, any Our initial test identified the vulnerability is exploitable from the LAN. Nonetheless, the service seems to be listening on all the interfaces (see below). Unfortunately, we were unable to verify the vulnerability on the WAN side as we lacked a suitable DSL connection. Using the information we have, we cannot exclude that the vulnerability is also exploitable on WAN side. Of course, we would be happy to hear more insight on this. CVE-2020-9279 – D-Link DSL-2640B - Hard-coded privileged accountFor this vulnerability we identified is a hard-coded user account. An attacker may use these credentials to login into the device in order to perform administrative tasks. The vulnerability was identified by analyzing the authentication process accessible via the web interface. While the ![]() An analysis of the The Reverse engineering this library told us that the following Although the password of the user Dsl D Link For MacbookInterestingly, even though Also, interestingly, these credentials are referred to as The source code itself does not reveal any intention of obfuscation. The credentials seem to be valid for other ASUS devices as well. ASUS refers to them as the One could say that it's basically an ASUS Dsl D Link For Mac ProThe last remark we would like to make is that this vulnerability may be exploited through browser pivoting. A malicious website, visited with any device connected to the WiFi/LAN, may perform crafted requests towards the gateway. CVE-2020-9278 – D-Link DSL-2640B - Unauthenticated configuration resetThis vulnerability allows an attacker to reset the device to its default configuration by accessing a specific URL. No authentication is required. Dsl D Link For Mac Windows 10In fact, the following URLs can be accessed without authentication.
Specifically, the device can be reset to default factory configuration by simply requesting the following URL: An attacker may reset the administrative password to its default value While the exploitation of this vulnerability requires access to the device LAN interface, it can also be remotely exploited via browser pivoting. An attacker in control of a malicious website may blindly reset the configuration of the device and, under some conditions, take full control of the device. CVE-2020-9277 – D-Link DSL-2640B - CGI Authentication bypassThe CVE-2020-9277 vulnerability allows bypassing the authentication process for authenticated resources. An attacker may be able to directly access administrative functions of the web interface, without the need to supply valid credentials. The web server first identifies (1) whether the requested The code then identifies (2) special resources for which the authentication is not necessary. Examples are images or Finally, if a All the above checks act in isolation, no state is carried over. An attacker can then craft malicious URLs for bypassing authentication for This vulnerability gives an attacker full device control and allows performing unauthenticated administrative functions. This vulnerability requires accessing the device LAN interface, but it is suitable for exploitation via browser pivoting, allowing for remote attacks over the Internet. CVE-2020-9276 – D-Link DSL-2640B - do_cgi buffer overflowThis vulnerability is a buffer overflow occurring in the The Dsl D Link For Mac OsA long D-link For MacThe Dsl D Link For Mac DownloadWhile the vulnerability is potentially exploitable via browser pivoting, exploitation may not be trivial due to the URL mangling introduced by the browser when applying URL encoding on the outgoing requests. ![]() Sharedblog887 © 2021
|