• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Question on third-party hardware connected to WiFi

Stg-Flame

Diamond Member
I just bought my girlfriend a Bose SoundTouch 2.0 for Christmas and I was just informed, the Bose needs to be connected to my WiFi at all times in order to play via Pandora and the like. Are there any security concerns with allowing something like this to be on my WiFi? Even smartphones have some form of security measures, but when I bring up the list of what all is connected to my network, I can access the SoundTouch from anything without being prompted with a security key.

Could someone potentially access my network through the SoundTouch?
 
Doesn't your WIFI use WPA2 and have a password of at least 16 digits? That would make it so the soundtouch would need the password.
 
I'm a little confused, OP. Does the SoundTouch connect via WiFi to a router, or does a PC connect via WiFi to the SoundTouch? There should be encryption options either way.
 
It connects via WiFi to the router but I was just concerned it would be a vulnerability to my system and since I don't know much about security and WiFi systems, I thought I would ask the experts before exposing my system.
 
Wi-Fi can indeed be a hacker's freeway without proper security controls such as those mentioned above. Do not let your Wi-Fi become public Wi-Fi.
 
My router is a Motorola Surfboard and it came with the security passkey printed on the label under the router itself, so I assume it's secure - especially since I need that key every time I try to connect something to my router.

Thanks for all the information and I will welcome any additional information concerning WiFi security and vulnerabilities.
 
So when you used the speakers did you have to type that key into the speakers? Because if you didn't the WIFI isn't secured. The best way to check if your WIFI is secured is through your laptop and clicking on the connection app in the task bar, there should be a lock next to your SSID (your WIFI name) if you even know what that is. Your network would most likely have the highest signal strength.

It is very important that your WIFI is secure because you are responsible for what goes through your network and if someone downloads child porn on your network the FBI will bang on your door.

Ii think you can access your modem by entering 192.168.100.1 into the address bar of your browser. If it asks for a password and user name try Admin.

Password: Admin

Username: Admin

Password: Just blank no password

Username: Admin

Those combinations.
 
Last edited:
The speakers are controlled by an app on her phone. She has to input the key in the app to make it work.
 
My router is a Motorola Surfboard and it came with the security passkey printed on the label under the router itself, so I assume it's secure - especially since I need that key every time I try to connect something to my router.

Thanks for all the information and I will welcome any additional information concerning WiFi security and vulnerabilities.

Just checking... You're not using the default password are you?

Username and admin password:
Default IP login address: 192.168.0.1
Default Username: admin
Default Password: motorola

If you're not, just ignore this post...

Uno
 
The main source of weakness would be in how the speakers/phone app store the Wifi password on the system, if someone steals the phone and jail breaks it and looks at the local storage, are they going to find the password stored in clear text? Probably, it might be encrypted but the encryption keys would also have to be on the device.

Also, mobile devices which have wifi passwords set to remember and to auto join (most do by default) beacon out the wifi they're looking to connect to. So if she has her phone at work for example, and its beaconing out requests, someone can put up a network with the same name and it will attempt to connect, that will cause a 4 way handshake to occur, the phone wont connect to it because the fake AP won't know the real wifi password, but the 4 way handshake does contain a hashed version of the password, this means you can do an offline dictionary attack against it.

You need a strong and unique password to the router and just remember that any wireless device you set to remember your wifi password and is set to auto reconnect is vulnerable to leaking the password if the password is weak (appears in a dictionary list)
 
Back
Top