• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

VPNFilter info and vulnurable routers

Status
Not open for further replies.

pcm81

Senior member
US government has actually issued a warning about VPNFilter virus. See details here: https://www.us-cert.gov/ncas/current-activity/2018/05/23/VPNFilter-Destructive-Malware

According to the internets the following routers are susceptible:
https://www.symantec.com/blogs/threat-intelligence/vpnfilter-iot-malware
  • Linksys E1200
  • Linksys E2500
  • Linksys WRVS4400N
  • Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072
  • Netgear DGN2200
  • Netgear R6400
  • Netgear R7000
  • Netgear R8000
  • Netgear WNR1000
  • Netgear WNR2000
  • QNAP TS251
  • QNAP TS439 Pro
  • Other QNAP NAS devices running QTS software
  • TP-Link R600VPN
Does anyone know if this malware is simply exploiting default passwords or if it is actually exploiting a security hole in the above devices?
Also, if anyone knows of any additional devices that are vulnerable, please post below.

I am running WINDR4300V2 as my main wifi device with a Linksys 325RV sitting behind the wi-fi router for a non-wifi subnet. I am wondering if my routers have the safe firmware holes as the devices listed above.
 
Status
Not open for further replies.
Back
Top