April 29, 2024, 2:05 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

End of March, NetworkSecurityFish disclosed a vulnerability in various D-Link NAS devices [1]. The vulnerability allows access to the device using the user “messagebus” without credentials. The sample URL used by the PoC was:


Article Link: https://isc.sans.edu/diary/rss/30878


1 post - 1 participant


Read full topic

access backdoor credentials device devices d-link d-link nas d-link nas devices end link march nas poc sample topic url vulnerability

Sr. Product Manager

@ MixMode | Remote, US

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Product Security Engineer

@ ServiceNow | Hyderabad, India

Senior Application Security Engineer (Puerto Rico)

@ RTX | HPR99: Field Office – PR, Remote Location, Remote City, PR, 00921 USA