Your Linksys Smart Wi-Fi Router Model Could Be Vulnerable

Are you the owner of a Linkys Smart Wi-Fi router? Then pay attention to this article. Researchers from IOActive recently unveiled that 25 models router models are vulnerable to dangerous attacks that could compromise the owners in the worst possible way. Unauthorized third parties could reboot, lock out and extract sensitive router data from the devices.

Linksys Smart Wi-Fi Routers 802.11N and 802.11AC Found Vulnerable

Apparently, the bug affects the latest Linksys Smart Wi-Fi Router models 802.11N and 802.11AC.

Related: Remove Malware from Your Router Effectively

Researchers say that there are about 7,000 vulnerable routers affected by the security bug. Unfortunately, additional 100,000 routers may also be in use making them prone to the vulnerability. It’s also known that a prevalent number of the affected routers are located in the US. However, such devices can be found also in countries such as Canada, Chile, Hong Kong, Venezuela, Argentina, Russia, Norway, India, etc.

As pointed out by the researchers:

We found about 7,000 vulnerable devices exposed at the time of the search. It should be noted that this number does not take into account vulnerable devices protected by strict firewall rules or running behind another network appliance, which could still be compromised by attackers who have access to the individual or company’s internal network.

Fortunately, IOActive says that the vulnerability hasn’t been exploited in the wild, at least for now. Linksys has been notified of the issue and a security advisory http://www.linksys.com/us/support-article?articleNum=246427 has been released. “As we work towards publishing firmware updates, as a temporary fix, we recommend that customers using Guest Networks on any of the affected products below temporarily disable this feature to avoid any attempts at malicious activity,” the company noted.

Related: CVE-2017-3881 Affects More than 300 Cisco Switches

Owners of these routers should also consider changing the default password of the admin account so that the web admin interface is shielded. A firmware update is expected soon. Until then, owners are advised to be careful. Automatic updates should be enabled and the WiFi Guest Network should be disabled when not in use.

Milena Dimitrova

An inspired writer, focused on user privacy and malicious software. Enjoys 'Mr. Robot' and fears '1984'.

More Posts - Website

Newsletter
Subscribe to receive regular updates about the state of PC Security and latest threads.

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.