D-Link

D-Link Corporation
友訊科技股份有限公司
D-Link Systems, Inc.
Public
Traded as TWSE: 2332
Industry Networking equipment
Founded March 1986 (1986-03)
(as Datex Systems Inc.)
1994 (as D-Link Corporation)
Headquarters Taipei, Taiwan
Key people
Douglas Hsaio (Chairman)
Products Hubs, Routers, DSL/Cable Gateways, Switches, Wireless Access Points, Storage and security IP cameras
Revenue Decrease NT$ 26,614 million (2015)
Number of employees
2,722 (2015)
Website www.dlink.com

D-Link Corporation (Chinese: 友訊科技) is a Taiwanese multinational networking equipment manufacturing corporation headquartered in Taipei, Taiwan. It was founded in March 1986 in Taipei as Datex Systems Inc.[1]

History

D-Link Corporation changed its name from Datex Systems Inc. in 1994, when it went public and when it became the first networking company on the Taiwan Stock Exchange. It is now publicly traded on the TSEC and NSE stock exchanges. It was founded by seven individuals including Ken Kao, the late Chairman of D-Link.

In 2007, it was the leading networking company in the small to medium business (SMB) segment worldwide with 21.9% market share.[2] In March 2008, it became the market leader in Wi-Fi product shipments worldwide, with 33% of the total market.[3] In 2007, the company was featured in the "Info Tech 100", a listing of the world's best IT companies. It was also ranked as the 9th best IT company in the world for shareholder returns by BusinessWeek.[4]

Product range

D-Link's products are geared towards the networking and communications market. Its business products include switches, surveillance network cameras, firewalls, iSCSI SANs and business wireless, while consumer products cover consumer wireless devices, broadband devices, and the Digital Home devices (which include media players, storage, and surveillance camera/NVR).

Vulnerabilities

In January 2010, it was reported that HNAP vulnerabilities had been found on some D-Link routers. D-Link was also criticized for their response which was deemed confusing as to which models were affected and downplayed the seriousness of the risk.[5]

In January 2013, version v1.13 for the DIR-100 revA was reported to include a backdoor in the firmware. By passing a specific user agent in an HTTP request to the router, normal authentication is bypassed. It was reported that this backdoor had been present for some time.[6]

Computerworld reported in January 2015 that ZynOS, a firmware used by some D-Link routers (as well as ZTE, TP-Link, and others), are vulnerable to DNS hijacking by an unauthenticated remote attacker, specifically when remote management is enabled.[7]

Later in 2015, it was reported that D-Link leaked the private keys used to sign firmware updates for the DCS-5020L security camera and a variety of other D-Link products. The key expired in September 2015, but had been published online for seven months.[8]

Also in 2015, D-Link was criticized for more HNAP vulnerabilities,[9] and worse, introducing new vulnerabilities in their "fixed" firmware updates.[10]

On January 5, 2017, the Federal Trade Commission sued D-Link for failing to take reasonable steps to secure their routers and IP cameras. As D-Link marketing was misleading customers into believing their products were secure. The complaint also says security gaps could allow hackers to watch and record people on their D-Link cameras without their knowledge, target them for theft, or record private conversations.[11] D-Link has denied these accusations and has enlisted Cause of Action Institute to file a motion against the FTC for their "baseless" charges.[12]

Server misuse

In 2006, D-Link was accused of NTP vandalism, when it was found that its routers were sending time requests to a small NTP server in Denmark, incurring thousands of dollars of costs to its operator. D-Link initially refused to accept responsibility.[13] Later, D-link products were found also to be abusing other time servers, including some operated by the US military and NASA.[14]

GPL violation

On September 6, 2006, the gpl-violations.org project prevailed in court litigation against D-Link Germany GmbH regarding D-Link's alleged inappropriate and copyright infringing use of parts of the Linux kernel.[15]

See also

References

  1. Bloomberg Businessweek. "D-Link Corp." Retrieved July 11, 2012.
  2. Compiled from In-Stat Q1 2007 Wireless LAN Equipment Market Share Report
  3. In-Stat Q4/07 WLAN Market Share Report
  4. BusinessWeek Magazine, "Info Tech 100" – Issue July 2, 2007
  5. "Which Routers Are Vulnerable to the D-Link HNAP Exploit?". January 18, 2010. Archived from the original on 26 December 2013.
  6. Yegulalp, Serdar. "D-Link's backdoor: What else is in there?". InfoWorld. Retrieved 2016-04-01.
  7. Constantin, Lucian. "DNS hijacking flaw affects D-Link DSL router, possibly other devices". Computerworld. Retrieved 2016-04-01.
  8. "In blunder threatening Windows users, D-Link publishes code-signing key". Ars Technica. Retrieved 2016-04-01.
  9. "Hacking the D-Link DIR-890L".
  10. "What the Ridiculous Fuck, D-Link?!".
  11. FTC sues D-Link over router and camera security flaws | Consumer Information
  12. "Cause of Action Institute Files Motion to Dismiss FTC’s Baseless Data Security Charges Against D-Link Systems Inc. - Cause of Action Institute". Cause of Action Institute. 2017-01-31. Retrieved 2017-02-12.
  13. Leyden, John. "D-Link accused of 'killing' time servers. Time to stop freeloading". The Register.
  14. Ward, Mark. "Net clocks suffering data deluge". BBC.
  15. GPL-Violations.org project prevails in court case on GPL violation by D-Link Archived 7 October 2014 at the Wayback Machine.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.