Прошивка и настройка D-link DES3200-26 с привязкой к RADIUS NPS

В данной статье опишу реализацию доменной авторизации на коммутаторах D-link, с разграничением прав для техника (чтение) и (чтение+запись) для системного администратора. Этим мы решаем задачу по смене пароля каждые 90 дней, согласно моей групповой политике в домене. А так же при увольнения сотрудника у вас пропадёт надобность менять пароли на коммутаторах, заблокируем в домене этим мы исключаем компрометацию логина и пароля на наше сетевое устройство.

https://habr.com/ru/companies/timeweb/articles/1021646/

#dlink #nps #radius #radius_nps

Прошивка и настройка D-link DES3200-26 с привязкой к RADIUS NPS

Настройка D-link DES3200-26, rev.A1, rev.C1 + RADIUS Windows NPS В данной статье опишу реализацию доменной авторизации на коммутаторах D-link, с разграничением прав для техника (чтение) и...

Хабр
🔒 CVE-2026-5844: HIGH-severity OS command injection in D-Link DIR-882 (v1.01B02). Remote attackers can execute arbitrary OS commands. No official fix — upgrade or restrict remote access. Details: https://radar.offseq.com/threat/cve-2026-5844-os-command-injection-in-d-link-dir-8-643de94e #OffSeq #DLink #Vuln #RouterSecurity

heise+ | WLAN to go: Fünf Mobilfunkrouter mit 5G im Test

5G-Mobilfunkrouter benötigen nur Netzempfang und bringen Wi-Fi auf den Campingplatz, ins Hotel, Ferienhaus und in die Laube. Wir haben fünf Modelle getestet.

https://www.heise.de/tests/WLAN-to-go-Fuenf-Mobilfunkrouter-mit-5G-im-Test-11228466.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&utm_source=mastodon

#G #AVM #DLink #Mobiles #Router #WLAN #news

WLAN to go: Fünf Mobilfunkrouter mit 5G im Test

5G-Mobilfunkrouter benötigen nur Netzempfang und bringen Wi-Fi auf den Campingplatz, ins Hotel, Ferienhaus und in die Laube. Wir haben fünf Modelle getestet.

Mac & i
🚨 CVE-2026-4529: HIGH severity stack-based buffer overflow in D-Link DHP-1320 (1.00WWB04) via SOAP Handler. Public exploit out. Device is EOL, no patch — isolate or replace now! https://radar.offseq.com/threat/cve-2026-4529-stack-based-buffer-overflow-in-d-lin-7f100378 #OffSeq #Vulnerability #DLink #BufferOverflow #InfoSec
OpenWrt Router D-Link DIR-842 C3

Vendo D-Link DIR-842 C3 - AC1200 con OpenWrt 25.12.1 (latest release) senza scatola originale, alcuni graffi nella parte inferiore.

Supporta PPPoE, WPA3, VLAN, HTTPS, SSH, VPN, Mesh, MQTT Broker e QoS .

Il router è venduto resettato alle impostazioni di base con interfaccia in inglese. Richiede un minimo di configurazione iniziale via cavo Ethernet.

Specifiche tecniche: wifi: 5 GHz: 900 Mbps (802.11 a/n/ac) wifi: 2.4 GHz: 300 Mbps (802.11 b/g/n) 1× Porta Gigabit WAN 4× Porte Gigabit LAN 4× Antenne fisse ad alte prestazioni.

Disponibile per consegna a mano o spedizione da concordare

Price: 18 € :: Questo è un articolo disponibile su FediMercatino.it

Si prega di rispondere con un messaggio diretto/privato al promotore dell'annuncio.

Per informazioni su: Fedimercatino: Chi siamo

Seguici su @[email protected] e sul gruppo @[email protected]

🚨 CRITICAL: CVE-2026-4182 in D-Link DIR-816 (v1.10CNB05) — stack buffer overflow in /goform/form2Wl5RepeaterStep2.cgi enables remote code execution. No patch, public exploit exists. Replace or isolate devices now! https://radar.offseq.com/threat/cve-2026-4182-stack-based-buffer-overflow-in-d-lin-4b5e9537 #OffSeq #DLink #IoTSecurity
🚨 CVE-2026-4212 (HIGH, CVSS 8.7): D-Link DNS-120 NAS stack buffer overflow in /cgi-bin/download_mgr.cgi enables remote, unauthenticated compromise. Patch or restrict access now. https://radar.offseq.com/threat/cve-2026-4212-stack-based-buffer-overflow-in-d-lin-423aef88 #OffSeq #Vulnerability #DLink #BlueTeam
CVE-2026-4206: MEDIUM severity command injection in D-Link DNS-120 NAS (20260205). Remote, unauthenticated exploit possible — PoC public, patch ASAP or restrict access. Monitor for suspicious /cgi-bin/dsk_mgr.cgi activity. https://radar.offseq.com/threat/cve-2026-4206-command-injection-in-d-link-dns-120-65477eea #OffSeq #DLink #Vuln
CVE-2026-4188: HIGH severity stack-based buffer overflow in D-Link DIR-619L (2.06B01). Allows remote, unauthenticated RCE. Device is unsupported — replace or strictly isolate! Exploit is public. More: https://radar.offseq.com/threat/cve-2026-4188-stack-based-buffer-overflow-in-d-lin-4643e6f2 #OffSeq #Vuln #DLink #InfoSec
⚠️ CRITICAL: D-Link DIR-816 (1.10CNB05) stack-based buffer overflow via pskValue in /goform/form2Wl5BasicSetup.cgi. Exploit is public, remote code execution possible. Device is EOL — isolate or replace! CVE-2026-4184 https://radar.offseq.com/threat/cve-2026-4184-stack-based-buffer-overflow-in-d-lin-8b4d54d9 #OffSeq #DLink #Vuln