D-Link Corporation
D-Link Systems, Inc.
Traded as TWSE: 2332
Industry Networking equipment
Founded March 1986 (1986-03)
(as Datex Systems Inc.)
1994 (as D-Link Corporation)
Headquarters Taipei, Taiwan
Key people
Douglas Hsaio (CEO), John Hsuan (Chairman)
Products Hubs, Routers, DSL/Cable Gateways, Switches, Wireless Access Points, Storage and security IP cameras
Revenue Decrease NT$ 26,614 million (2015)
Number of employees
2,722 (2015)
Website www.dlink.com

D-Link Corporation (Chinese: 友訊科技) is a Taiwanese multinational networking equipment manufacturing corporation headquartered in Taipei, Taiwan. It was founded in March 1986 in Taipei as Datex Systems Inc.[1] It began as a network adapter vendor and has gone on to become a designer, developer, and manufacturer of networking solutions for both the consumer and business markets.

In 2007, it was the leading networking company in the small to medium business (SMB) segment worldwide with 21.9% market share.[2] In March 2008, it became the market leader in Wi-Fi product shipments worldwide, with 33% of the total market.[3] In 2007, the company was featured in the "Info Tech 100", a listing of the world's best IT companies. It was also ranked as the 9th best IT company in the world for shareholder returns by BusinessWeek.[4]


D-Link Corporation changed its name from Datex Systems Inc. in 1994, when it went public and when it became the first networking company on the Taiwan Stock Exchange. It is now publicly traded on the TSEC and NSE stock exchanges. It was founded by seven individuals including Ken Kao, the late Chairman of D-Link.

Product range

D-Link's products are geared towards the networking and communications market. Its business products include switches, surveillance network cameras, firewalls, iSCSI SANs and business wireless, while consumer products cover consumer wireless devices, broadband devices, and the Digital Home devices (which include media players, storage, and surveillance camera/NVR).


In January 2010, it was reported that HNAP vulnerabilities had been found on some D-Link routers. D-Link was also criticized for their response which was deemed confusing as to which models were affected and downplayed the seriousness of the risk.[5]

In January 2013, version v1.13 for the DIR-100 revA was reported to include a backdoor in the firmware. By passing a specific user agent in an HTTP request to the router, normal authentication is bypassed. It was reported that this backdoor had been present for some time.[6]

Computerworld reported in January 2015 that ZynOS, a firmware used by some D-Link routers (as well as ZTE, TP-Link, and others), are vulnerable to DNS hijacking by an unauthenticated remote attacker, specifically when remote management is enabled.[7]

Later in 2015, it was reported that D-Link leaked the private keys used to sign firmware updates for the DCS-5020L security camera and a variety of other D-Link products. The key expired in September 2015, but had been published online for seven months.[8]

Also in 2015, D-Link was criticized for more HNAP vulnerabilities,[9] and worse, introducing new vulnerabilities in their "fixed" firmware updates.[10]

Server misuse

In 2006, D-Link was accused of NTP vandalism, when it was found that its routers were sending time requests to a small NTP server in Denmark, incurring thousands of dollars of costs to its operator. D-Link initially refused to accept responsibility.[11] Later, D-link products were found also to be abusing other time servers, including some operated by the US military and NASA.[12]

GPL Violation

On September 6, 2006, the gpl-violations.org project prevailed in court litigation against D-Link Germany GmbH regarding D-Link's alleged inappropriate and copyright infringing use of parts of the Linux kernel.[13]

See also


  1. Bloomberg Businessweek. "D-Link Corp." Retrieved July 11, 2012.
  2. Compiled from In-Stat Q1 2007 Wireless LAN Equipment Market Share Report
  3. In-Stat Q4/07 WLAN Market Share Report
  4. BusinessWeek Magazine, 'Info Tech 100' – Issue July 2, 2007
  5. "Which Routers Are Vulnerable to the D-Link HNAP Exploit?". January 18, 2010. Archived from the original on 26 December 2013.
  6. Yegulalp, Serdar. "D-Link's backdoor: What else is in there?". InfoWorld. Retrieved 2016-04-01.
  7. Constantin, Lucian. "DNS hijacking flaw affects D-Link DSL router, possibly other devices". Computerworld. Retrieved 2016-04-01.
  8. "In blunder threatening Windows users, D-Link publishes code-signing key". Ars Technica. Retrieved 2016-04-01.
  9. "Hacking the D-Link DIR-890L".
  10. "What the Ridiculous Fuck, D-Link?!".
  11. Leyden, John. "D-Link accused of 'killing' time servers. Time to stop freeloading". The Register.
  12. Ward, Mark. "Net clocks suffering data deluge". BBC.
  13. GPL-Violations.org project prevails in court case on GPL violation by D-Link Archived 7 October 2014 at the Wayback Machine.
Wikimedia Commons has media related to D-Link.
This article is issued from Wikipedia - version of the 11/16/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.