Multiple Vulnerabilities Identified in ‘Utterly Broken’ Routers!
Routers that can not be secured?
Will the average user understand or even know to care?
While most users of routers will not understand the total meaning behind this, including us at times.
But, a simple takeaway:
- Not all routers are created equal.
- You get what you pay for.
- Research and understand your security needs.
- Identify the correct device based on you needs.
- Consult with others in the industry if you are unsure.
Researchers have identified a router so fraught with vulnerabilities and so “utterly broken” that it can be exploited to do pretty much anything. An attacker could bypass its authentication, peruse sensitive information stored in the router’s system logs and even use the device to execute OS commands with root privileges via a hardcoded root password. Tao Sauvage, a Security Consultant with IOActive Labs purchased the device, a BHU WiFi router he nicknamed “uRouter” on a recent trip to China. …
Technical news from the techies at E2 Computers, in Tarpon Spring FL and on the web at www.end2endsupport.com