vulnerability
FBI: End-of-life routers hacked for cybercrime proxy networks
Is your router end-of-life (EoL)? If so, it’s best to replace it to avoid it being exploited to route malicious traffic. More details are in this article, linked below. A short list of currently exploited EoL routers are… Linksys E1200, E2500, E1000, E4200, E1500, E300, E3200, E1550, WRT320N, WRT310N, WRT610N, Cisco M10
The FBI warns that threat actors are deploying malware on end-of-life (EoL) routers to convert them into proxies sold on the 5Socks and Anyproxy networks.
Source: FBI: End-of-life routers hacked for cybercrime proxy networks
TP-Link Archer WiFi router flaw exploited by Mirai malware
The Mirai malware botnet is actively exploiting a TP-Link Archer A21 (AX1800) WiFi router vulnerability tracked as CVE-2023-1389 to incorporate devices into DDoS (distributed denial of service) swarms.
Source: TP-Link Archer WiFi router flaw exploited by Mirai malware
Netgear Router Vulnerabilities
Multiple Netgear router models contain vulnerabilities that a remote attacker can exploit to take control of an affected device. Widomaker does not provide Netgear routers with our service, however, many of our customers may have purchased one, themselves, to use with their Internet service. If you are using one of the affected Netgear models, you should update or replace the device, immediately. Please continue reading to determine if your Netgear router model is affected…
Vulnerabilities in Dell SupportAssist Software
Vulnerabilities were recently discovered, by a 17 year old security researcher, in Dell support software, that is included on Dell desktop and laptop computers, that could allow an attacker to compromise, and take over, the computer.
KRACK Wi-Fi Vulnerability
On Oct 16 2017 US-CERT released Vulnerability Note VU#228519 after researchers disclosed “serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks.” They have named the proof-of-concept exploits, KRACK (key reinstallation attacks)…
The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. […] To prevent the attack, users must update affected products as soon as security updates become available.