Company:D-Link
Type | Public |
---|---|
TWSE: 2332 | |
Industry | Networking equipment |
Founded | March 1986 (as Datex Systems Inc.) 1994 (as D-Link Corporation) |
Headquarters | , Taiwan |
Key people | Douglas Hsaio (Chairman) |
Products | Routers, DSL/Cable Gateways, Switches, Wireless access points, Storage and security IP cameras |
Revenue | NT$ 26,614 million (2015) |
Number of employees | 2,722 (2015) |
Website | dlink |
D-Link Corporation (Chinese: 友訊科技) is a Taiwanese multinational networking equipment manufacturing corporation headquartered in Taipei, Taiwan. It was founded in March 1986 in Taipei as Datex Systems Inc.[1]
History
D-Link Corporation changed its name from Datex Systems Inc. in 1994, when it went public and when it became the first networking company on the Taiwan Stock Exchange. It is now publicly traded on the TSEC and NSE stock exchanges.
In 2007, it was the leading networking company in the small to medium business (SMB) segment worldwide with 21.9% market share.[2] In March 2008, it became the market leader in Wi-Fi product shipments worldwide, with 33% of the total market.[3] In 2007, the company was featured in the "Info Tech 100", a listing of the world's best IT companies. It was also ranked as the 9th best IT company in the world for shareholder returns by BusinessWeek.[4]
Product range
D-Link's products are geared towards the networking and communications market. Its business products include switches, surveillance network cameras, firewalls, iSCSI SANs and business wireless, while consumer products cover consumer wireless devices, broadband devices, and the Digital Home devices (which include media players, storage, and surveillance camera/NVR).
Examples of D-Link products
Vulnerabilities
In January 2010, it was reported that HNAP vulnerabilities had been found on some D-Link routers. D-Link was also criticized for their response which was deemed confusing as to which models were affected and downplayed the seriousness of the risk.[5]
In January 2013, version v1.13 for the DIR-100 revA was reported to include a backdoor in the firmware. By passing a specific user agent in an HTTP request to the router, normal authentication is bypassed. It was reported that this backdoor had been present for some time.[6]
Computerworld reported in January 2015 that ZynOS, a firmware used by some D-Link routers (as well as ZTE, TP-Link, and others), are vulnerable to DNS hijacking by an unauthenticated remote attacker, specifically when remote management is enabled.[7]
Later in 2015, it was reported that D-Link leaked the private keys used to sign firmware updates for the DCS-5020L security camera and a variety of other D-Link products. The key expired in September 2015, but had been published online for seven months.[8]
Also in 2015, D-Link was criticized for more HNAP vulnerabilities,[9] and worse, introducing new vulnerabilities in their "fixed" firmware updates.[10]
On 5 January 2017, the Federal Trade Commission sued D-Link for failing to take reasonable steps to secure their routers and IP cameras. As D-Link marketing was misleading customers into believing their products were secure. The complaint also says security gaps could allow hackers to watch and record people on their D-Link cameras without their knowledge, target them for theft, or record private conversations.[11] D-Link has denied these accusations and has enlisted Cause of Action Institute to file a motion against the FTC for their "baseless" charges.[12]
Server misuse
In 2006, D-Link was accused of NTP vandalism, when it was found that its routers were sending time requests to a small NTP server in Denmark, incurring thousands of dollars of costs to its operator. D-Link initially refused to accept responsibility.[13] Later, D-link products were found also to be abusing other time servers, including some operated by the US military and NASA.[14]
GPL violation
On 6 September 2006, the gpl-violations.org project prevailed in court litigation against D-Link Germany GmbH regarding D-Link's alleged inappropriate and copyright infringing use of parts of the Linux kernel.[15]
See also
- List of companies of Taiwan
References
- ↑ Bloomberg Businessweek. "D-Link Corp." Retrieved 11 July 2012.
- ↑ Compiled from In-Stat Q1 2007 Wireless LAN Equipment Market Share Report
- ↑ In-Stat Q4/07 WLAN Market Share Report
- ↑ BusinessWeek Magazine, "Info Tech 100" – Issue 2 July 2007
- ↑ "Which Routers Are Vulnerable to the D-Link HNAP Exploit?". 18 January 2010. http://www.sourcesec.com/2010/01/.
- ↑ Yegulalp, Serdar. "D-Link's backdoor: What else is in there?". http://www.infoworld.com/article/2612757/hacking/d-link-s-backdoor--what-else-is-in-there-.html.
- ↑ Constantin, Lucian. "DNS hijacking flaw affects D-Link DSL router, possibly other devices". http://www.computerworld.com/article/2876292/dns-hijacking-flaw-affects-d-link-dsl-router-possibly-other-devices.html.
- ↑ "In blunder threatening Windows users, D-Link publishes code-signing key". https://arstechnica.com/security/2015/09/in-blunder-threatening-windows-users-d-link-publishes-code-signing-key/.
- ↑ "Hacking the D-Link DIR-890L". http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/.
- ↑ "What the Ridiculous Fuck, D-Link?!". http://www.devttys0.com/2015/04/what-the-ridiculous-fuck-d-link/.
- ↑ FTC sues D-Link over router and camera security flaws | Consumer Information
- ↑ "Cause of Action Institute Files Motion to Dismiss FTC’s Baseless Data Security Charges Against D-Link Systems Inc. - Cause of Action Institute" (in en-US). Cause of Action Institute. 2017-01-31. http://causeofaction.org/cause-action-institute-files-motion-dismiss-ftcs-baseless-data-security-charges-d-link-systems-inc/.
- ↑ Leyden, John. "D-Link accused of 'killing' time servers. Time to stop freeloading". The Register. https://www.theregister.co.uk/2006/04/13/d-link_time_row_escelates/.
- ↑ Ward, Mark. "Net clocks suffering data deluge". BBC. http://news.bbc.co.uk/1/hi/technology/4906138.stm.
- ↑ GPL-Violations.org project prevails in court case on GPL violation by D-Link
External links