Up on the bench today:Picked these up the other day because 8 bux, plus there were like 5 more loose in the two baggies; already deployed around the house.
Each box has 2 units; 5V/2A USB. Does quick-charge my daughter's new Christmas 2018 iPad; I think I
may have enough USB juice for the foreseeable future.
Picked this up the other day because... 5 bux. And looked like new.
Picked these up yesterday because 5 bux and apparently brand new 7200RPM Barracuda drives. Yeah, a whopping 120GB of spinning rust each, but I figured it would give me a chance to tinker with DLNA; a quick Gurrgle on my phone at the time of purchase showed the DNS320 supports up to 4TB drives and FTP, DLNA, Time Machine out of the box. w00t!
Replaced/cleaned up slightly crusty NVRAM battery; popped in the new drives. Time for the PEEL!!!
SQUEEEE! Now let's go online and find the latest firmware...
https://www.bleepingcomputer.com/news/security/cr1ptt0r-ransomware-infects-d-link-nas-devices-targets-embedded-systems/Well.... FUCK. Why the FUCK didn't THAT come up when I Googled the damn thing before I bought it?
...forum members offer information suggesting that the attack vector is most likely vulnerabilities in old firmware. A member of the Cr1ptT0r team confirmed this to us, saying that there are so many vulnerabilities in D-Link DNS-320 NAS models that they should be built from scratch to make things better. Although old versions of the firmware for DNS-320 are known to be vulnerable to at least one bug leading to remote code execution, a hard-coded backdoor was published in 2018 for ShareCenter DNS‑320L.
Good thing I haven't allowed it anywhere near my network yet.
I guess I can still safely use the power brick for somethinnn...
KILL IT. KILL IT WITH FIRE!!! mnem
Ummmm... Anybody need a really good present for a rotten ex-boss...?