Tag Archives: Linksys

A new post by Ars Technica published yesterday reports two critical vulnerabilities affecting a series of ASUS RT routers. According to the report almost 13,000 routers have been exploited in the 8 months since the vulnerabilities were publicly disclosed, and the users of those routers have had files leaked online. ASUS is said to have patched the routers late last week.

As if that wasn’t enough, the same article makes mention of an attack that infects Linksys routers with self-replicating malware. The worm doesn’t seem to be stealing any data though.

Dan Gooding, the post’s author, notes in his closing paragraph:

Taken together, the attacks are a sign that routers and other Internet-connected devices are being subject to the same in-the-wild attacks that have plagued PCs—and in some cases Macs—for years. Readers are advised to lock down their routers by installing any available firmware updates, changing any default passwords, and ensuring that remote administration, Cloud, and FTP options are set to off if they’re not needed

You can find Ars’ post here.

If you have any questions or if you spotted any errors or omissions, please leave me a comment.


Updated January 04, 2014 – added link to Naked Security.

An Ars Technica post reports a Linksys WAG200G vulnerability, discovered by Eloi Vanderbeken, which, if exploited, provides the attacker with admin access. To take advantage of the backdoor the attacker needs to be on the local network and talk to TCP port 32764.

The WAG200G is not the only modem affected by this vulnerability. According to Ars the backdoor has been found on other Linksys models and on Netgear DSL modems as well.

You can read more about it on Ars Technica.

Vulnerabilities like this one are the reason why you need to make sure your modem/router is always running the latest firmware or switch to an open source alternative.

Update: Naked Security posted a nice write-up for this issue. You can find it here.

If you have any questions or if you spotted any errors or omissions, please leave me a comment.