Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

C2 provides technology services and consultation to businesses and individuals.

T (818) 584 6021
Email: [email protected]

C2 Technology Partners, Inc.
26500 Agoura Rd, Ste 102-576, Calabasas, CA 91302

Open in Google Maps
QUESTIONS? CALL: 818-584-6021
  • HOME
  • BLOG
  • SERVICES
    • Encryption
    • Backups
  • ABOUT
    • SMS Opt-In Form
    • Terms and Conditions
    • Privacy Policy
FREECONSULT
Monday, 17 February 2014 / Published in Woo on Tech

Linksys Routers Vulnerable to Remote Exploit

Linksys Zero Day Warning

Several models of popular Linksys-brand routers may impacted by a self-replicating worm that can exploit a security flaw in the router’s programming. The exploit allows attackers to install a worm in the firmware which can lead to further security breaches on any device connected to that router’s network. According to Linksys, this exploit requires that the routers have the “Remote Management” feature enabled on the device, a setting that is disabled by default on Linksys routers. Depending on who set up your router, this setting may have been enabled expressly for remote management purposes, and as such your device is vulnerable to the worm, dubbed “TheMoon”.

What this means for you:

Linksys routers are a popular choice for home and small businesses. Unless you know for certain your router is not a Linksys device, I would put an eyeball on your router and check the make and model against the list below.  Your network router is a critical point in your network’s overall security, and a compromised router can lead to a variety of problems and significant invasions of your privacy and safety. Even if your Linksys model is not named below, it’s important to check whether or not “Remote Management” is enabled on your device.

As of now, the following model routers are affected: E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900, E300, WAG320N, WAP300N, WAP610N, WES610N, WET610N, WRT610N, WRT600N, WRT400N, WRT320N, WRT160N and WRT150N. Linksys hasn’t confirmed whether this list will grow, as it does not want to reveal other models and make them targets for attacks. Until Linksys can patch the loopholes and issue firmware updates the only workaround is to disable the Remote Management feature, install the latest version of the firmware available, and reboot the router to clear any possible worms.

 

  • Tweet
Tagged under: belkin, exploit, firmware, linksys, security, the moon, worm, zero day

What you can read next

Who watches the watchers?
Getting off the grid in 2018
MS Zero Day Warning
Another Zero-day IE Flaw Surfaces
The state flag of South Carolina
Millions of SC ID’s Compromised

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Employees in a meeting, AI is present

    Shadow AI – The Security Risk Already Inside Your Company

    Your employees are using unauthorized AI tools ...
  • Email Credential Theft is Still Hot

    You would think that with all the money pouring...
  • Misleading Signs

    How to live in a Post-Truth World

    In 2016, the Oxford Dictionary named “pos...
  • two ceramic smiling poop emojis on a white background

    Scatological Devolution

    [Warning: there is some slightly foul language ...
  • Can you tell the difference?

    I’ve been working in tech long enough to rememb...

Archives

  • GET SOCIAL
Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

© 2016 All rights reserved.

TOP