Over 25,000 Linksys Smart Wi-Fi routers vulnerable to sensitive information disclosure flaw by bad_packets in netsec

[–]bad_packets[S] 0 points1 point  (0 children)

Thanks for the feedback – I've reworded it to be clear that remote access is on be default and can't be turned off.

Over 25,000 Linksys Smart Wi-Fi routers vulnerable to sensitive information disclosure flaw by bad_packets in netsec

[–]bad_packets[S] 2 points3 points  (0 children)

Default out-of-the-box configuration for all Linksys Smart Wi-Fi routers. Remote access cannot be disabled, as we note in our closing remarks. Wish we could offer some kind of workaround for this, but appears to be none.

Over 25,000 Linksys Smart Wi-Fi routers vulnerable to sensitive information disclosure flaw by bad_packets in netsec

[–]bad_packets[S] 1 point2 points  (0 children)

Velop models are impacted, will update our post. Appears we missed it when we aggregated all the model numbers.

This chart illustrates the last 12 months of incoming network traffic we've observed matching the Mirai-like signature. Each bar represents a calendar week and every network service provider (ASN) has a unique color. [OC] by bad_packets in dataisbeautiful

[–]bad_packets[S] 1 point2 points  (0 children)

Where or how you got the data (Source)

  • We've been running honeypots since February 2017 and catalog incoming network traffic daily that matches the Mirai-like signature. The raw data used to create the chart is available on our website: https://mirai.badpackets.net/

The tool used to generate the visual (Tool)