Sunday, September 20, 02:37
Home security Popular router vulnerabilities: What to check

Popular router vulnerabilities: What to check

Researchers they discovered 125 security vulnerabilities in 13's popular SOHO router and NAS devices, making these models vulnerable to remote attacks and thus endangering millions of users.

The research by Independent Security Evaluators (ISE), an independent security consulting firm, ranged from widely used models to high-end enterprise-grade devices, with the focus being primarily on devices from well-known and trusted manufacturers.

Each of the 13 devices was found to contain at least one security vulnerability in the Web Application, which could be used by an intruder to gain remote access to the device or control panel, and from there, to further attacks within a home or corporate network.

Gaps in authentication and authorized access issues were also identified. ISE reported the research findings to the manufacturers, some of whom rushed to fix the problems, but some did not respond in time.router SOHO

These findings show that routers can be attacked fairly easily, making them the Achilles' heel of overall Internet security. For this reason, and regardless of the model used, ESET recommends that each user take some time and check five key points in a router's security.

Password. Many users are not in the process of changing it password when installing the router on the network, however, the pre-installed codes of all the router can be easily found with a simple web search. For this reason, strong usernames and usernames need to be changed and used.

Creating separate networks. Most modern routers offer the ability to create separate network for each purpose, while some models have firewalls that allow you to analyze incoming and outgoing traffic and determine which connections are allowed. These functions can separate the most 'sensitive' devices or isolate some of the rest of the network.

Disable unused services and features. If remote access to the network is not necessary, secure protocol management services (SSH, HTTPS) and disabling any unused function, as well as disconnecting all connected devices such as camera, microphone, etc. This closes the backdoors to hackers and nosy neighbors.

Regular check. In order to be able to detect unusual behavior or detect a potential intruder, the network owner must be constantly able to identify how many and to which devices they are connected, which is achieved if there is little time for verification at regular intervals.

Update firmwareOn the router, as with most IoT devices, its updates operating system they don't happen automatically, so the user needs to know the router model and firmware version to visit the manufacturer's site and check if there is an update to install.


Please enter your comment!
Please enter your name here

In a world without fences and walls, who needs Gates and Windows


The Windows 10 Android streaming app is available on some devices

Last month, Microsoft announced that Samsung Galaxy smartphones will be able to stream from Android apps to Windows ...

Hackers throw because he insulted Erdogan!

Hacker _ The website was hacked by Turkish hackers because it published a news headline that the Turkish government said offended ...

How to control your data consumption on Android!

Most people need to keep a close eye on data consumption to avoid any surprises in their account. So it is very important ...

What technological innovations determine the future of cybersecurity?

The advancement of technology beyond the facilities it offers, increasing both the speed and the quality of safety performance, ...

Microsoft Outlook: How to block emails from specific senders?

Have you ever received emails from people you do not want? If so, Microsoft ...

US: Department of Commerce abolishes TikTok on September 20th

As announced today by the US Department of Commerce, it will proceed to ban the download of the popular Chinese application TikTok and WeChat, ...

Group Tabs: Chrome will automatically create group Tabs

Google wants to rid users of manually creating tabs from users, so the Chromium team is testing it ...

Pinephone: The version with Manjaro Linux is now available for preorder

A few hours earlier, PINE64 announced that the new Pinephone 'Manjaro Community Edition' is now available for ...

Error allows remote code to run on Apple devices

Bugs found on iPhone, iPad and iPod have been fixed by Apple through new updates for iOS systems ...

The CEO of cyber fraud company NS8 has been arrested for fraud

The CEO of the NS8 cyber fraud company has been arrested and charged with defrauding the company's investors.