• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Millions of routers vulnerable to web attack

The spreadsheet indicates these routers were "successful" in being hacked, or "successful" defending against the hack?
 
Last edited:
Doing a bit of reading, it sounds like DD-WRT, Tomato and the like may be vulnerable as well. I'm trying to find a better explanation of the exploit, appears to be a weakness of the built-in web server used for the web interface. The only recommendation seems to be to change the default admin password. Well duh.
 
Successful at being hacked, if you're stupid enough to leave your router set to the factory default password.

So: change the password and you can ignore the FUD.
 
Though these router front-ends are normally password-protected, most people don't bother changing the default passwords, and even when they do, security flaws within the front-end may allow the password to be bypassed anyway.
 
How about I can exploit 5 out of 10 within range of my house because there isn't any security applied. No need for hacking when so many are wide open.
 
Successful at being hacked, if you're stupid enough to leave your router set to the factory default password.

So: change the password and you can ignore the FUD.

it mentions that even if the password is changed, vulnerabilities with the front-end can still let them in.
 
it mentions that even if the password is changed, vulnerabilities with the front-end can still let them in.

True, but that moves it from the hack they actually accomplished into "it still should be possible" territory.

Unless I misread it they only didn't bother to do any hacking of routers with changed passwords.
 
Successful at being hacked, if you're stupid enough to leave your router set to the factory default password.

So: change the password and you can ignore the FUD.

Wow aren't you so wise hiding behind your hindsight.
Why else would there be a point in changing your router default password? It's not like someone on your network is going to hack into your router.
 
Successful at being hacked, if you're stupid enough to leave your router set to the factory default password.

So: change the password and you can ignore the FUD.

Who's "you"?...everyone that buys their routers at Best Buy? Nah, the masses can't be that stupid...
 
Who's "you"?...everyone that buys their routers at Best Buy? Nah, the masses can't be that stupid...


Yes JJsole they are. I cannot tell you how many people I run into that buy products at BB and actually Geek Squad then call me to straighten things out. The money they throw away on anti virus and firewalls when all that is free on line.
 
Slighty OT: How long does it takes to crack WEP/WPA?

When I tried out WEP for fun it took <15 minutes once I found the right wifi card. Didn't try WPA as I understand its basically just a dictionary attack

I will say some of the setups I have seen on routers have gotten a lot better. There were a couple I recently setup for friends that had prompted you to secure the network and change the password.
 
I believe this is the exploit that involves UPNP. It can work by just visiting a page that executes any code on the pc side. You go to a flash site, the flash code executes on your pc and sends a UPNP request to the router. UPNP does not require a password. Once the malware sends the request it can open ports, change DNS and many other things.

If you want to know how vulnerable your router is, download PNP tools.
http://opentools.homeip.net/dev-tools-for-upnp

After install run device spy
That will list all the pnp devices on the network
Find your router and click through the various folders
Anything with a purple icon can be done via PNP without your consent.
You can double click a purple icon to bring up a window that will let you execute the function
 
Last edited:
The spreadsheet indicates these routers were "successful" in being hacked, or "successful" defending against the hack?

yea id like to know that as well, i have 2 in my house that are chained together, 1 is listed as No and other other as Yes

lol
 
The spreadsheet indicates these routers were "successful" in being hacked, or "successful" defending against the hack?

yea id like to know that as well, i have 2 in my house that are chained together, 1 is listed as No and other other as Yes

lol

From the article... which is quite short so an easy read:

A list of vulnerable routers tested so far can be found here -- the last column indicates whether the specific router listed is prone to this sort of attack or not.
 
Successful at being hacked, if you're stupid enough to leave your router set to the factory default password.

So: change the password and you can ignore the FUD.

You would be surprised how many people have some home-network with a wireless router...but dont even KNOW that there is an admin interface, let alone router settings or passwords...
 
Back
Top