Você é o proprietário de um roteador Linkys Smart Wi-Fi? Então preste atenção a este artigo. Pesquisadores da IOActive revelou recentemente que 25 models router models are vulnerable to dangerous attacks that could compromise the owners in the worst possible way. Unauthorized third parties could reboot, lock out and extract sensitive router data from the devices.
Linksys Smart Wi-Fi Routers 802.11N and 802.11AC Found Vulnerable
Pelo visto, the bug affects the latest Linksys Smart Wi-Fi Router models 802.11N and 802.11AC.
relacionado: Remova o malware do seu roteador com eficácia
pesquisadores dizer that there are about 7,000 vulnerable routers affected by the security bug. Infelizmente, adicional 100,000 routers may also be in use making them prone to the vulnerability. It’s also known that a prevalent number of the affected routers are located in the US. Contudo, such devices can be found also in countries such as Canada, Chile, Hong Kong, Venezuela, Argentina, Rússia, Noruega, Índia, etc.
As pointed out by the researchers:
We found about 7,000 vulnerable devices exposed at the time of the search. It should be noted that this number does not take into account vulnerable devices protected by strict firewall rules or running behind another network appliance, which could still be compromised by attackers who have access to the individual or company’s internal network.
Felizmente, IOActive says that the vulnerability hasn’t been exploited in the wild, pelo menos por enquanto. Linksys has been notified of the issue and a security advisory https://www.linksys.com/us/support-article?articleNum=246427 has been released. “As we work towards publishing firmware updates, as a temporary fix, we recommend that customers using Guest Networks on any of the affected products below temporarily disable this feature to avoid any attempts at malicious activity,” the company noted.
relacionado: CVE-2017-3881 afeta mais de 300 Cisco Switches
Owners of these routers should also consider changing the default password of the admin account so that the web admin interface is shielded. A firmware update is expected soon. Até então, owners are advised to be careful. Automatic updates should be enabled and the WiFi Guest Network should be disabled when not in use.