Hi Geek,
you should be safe if the D-Link isn't accessible from outside but you can still get a virus or ransomware attack from your mainframe if you run an infected file or if a new exploit comes up.
I did so at work twenty years ago and spread a worm into our manufactory network with about 80 pc's.
My boss wasn't very happy about this but we could disinfect the thread quickly.
There's no vaccin and no 100% security.
So here for everyone who may be concerned an exerpt of my logfile created with a little software from Michael Gillespie, called CryptoSearch, this scans your entire discs or arrays for encrypted files and moves them to another location, preservant the entire path.
This is very useful, never you would sort them out by main. Perhaps one day we are able to decrypt but not today.
Cr1ptT0r was active only a few hours on my disk, the second time I woke up in the middle of the night I cut the power from the NAS.
Complete, found 11286 encrypted folders with 201840 encrypted files (63GB)
Also found 0 clean folders with 18692 clean files (1,7TB)
Retrieving data from ID Ransomware...
Retrieving data from local filesystem...
Loaded data on 702 ransomwares
Retrieving data from ID Ransomware...
Retrieving data from local filesystem...
Loaded data on 702 ransomwares
Directory selected: Z:\software
Searching for files encrypted by Cr1ptT0r Ransomware...
[-] Encrypted folder: Z:\software
...........
Complete, found 11286 encrypted folders with 201840 encrypted files (63GB)
Also found 0 clean folders with 18692 clean files (1,7TB)
Moving encrypted files (63GB) to: Z:\Encrypted
Complete, archived 201840 encrypted files
PS: it crypted mainly the small files, like .txt, .pdf, .wav, .mp3, .jpg and so on, so I'm very happy that this 2Tb disk was not really important to me and all my photos and documents are safe in another location.