- Jun 9, 2013
- 6,720
Over 20 models of Linksys Smart Wi-Fi routers have been found to have vulnerabilities that, if exploited, could allow attackers to overload a router and force a reboot, deny user access, leak sensitive information about the router and connected devices, change restricted settings, and inject and execute commands on the operating system of the router with root privileges.
The discovery was made by IOActive senior security consultant Tao Sauvage and independent security researcher Antide Petit, and the vulnerabilities responsibly disclosed to Linksys in January 27.
While Linksys acknowledged the existence of the flaws and has been working with IOActive on plugging them, they are still there and open to exploitation.
“As we work towards publishing firmware updates, as a temporary fix, we recommend that customers using Guest Networks on any of the affected products below temporarily disable this feature to avoid any attempts at malicious activity,” Linksys noted in a security advisory.
Full Article. www.helpnetsecurity.com/2017/04/20/linksys-smart-wi-fi-routers-vulnerabilities/
The discovery was made by IOActive senior security consultant Tao Sauvage and independent security researcher Antide Petit, and the vulnerabilities responsibly disclosed to Linksys in January 27.
While Linksys acknowledged the existence of the flaws and has been working with IOActive on plugging them, they are still there and open to exploitation.
“As we work towards publishing firmware updates, as a temporary fix, we recommend that customers using Guest Networks on any of the affected products below temporarily disable this feature to avoid any attempts at malicious activity,” Linksys noted in a security advisory.
Full Article. www.helpnetsecurity.com/2017/04/20/linksys-smart-wi-fi-routers-vulnerabilities/