Nine well-known WiFi routers that were used by millions of people worldwide have been found to have 226 possible security weaknesses, according to an analysis by cybersecurity specialists at IoT Inspector and CHIP magazine.
The fact that each of these well-known WiFi routers is using the most recent firmware for it is what makes them so interesting. While during this analysis, the analysts primarily paid attention to the models that small businesses and household consumers utilize.
The following list of routers includes those that are still susceptible to publicly known security flaws:-
common issues that most of the models suffered from
In addition, not all 226 defects found recently by security researchers pose the same level of risk because most models that have already undergone expert testing have experienced some widespread issues.
The following list includes all the typical issues:-
The firmware contains an outdated Linux kernel.
stale VPN and multimedia features
over-reliance on BusyBox’s earlier iterations
weak default passwords like “admin” are used
Hardcoded credentials are present in plain text.
brands of routers that are impacted
The well-known brands whose routers were examined and found to be vulnerable include:
The TP-Link Archer AX6000, among other manufacturers, tops the list with 32 security problems, followed by the Synology RT-2600ac with 30 security flaws.
Due to the extraction of the encryption key concern, D-Link routers have provided technical data about their results; however, they have not shared any technical details regarding other routers.
manufacturers who responded quickly
The manufacturers promptly responded to the researchers’ findings and delivered all necessary firmware updates. However, among them, the quick responders were:
Only one brand—AVM—is absent from this list, but this doesn’t necessarily mean that it hasn’t provided any patches. It seems that AVM responded later than all of these brands.
Users are encouraged to heed the advice we have provided below as a precaution, as advised by security researchers:
Apply the applicable security updates right now.
Always make “automatic updates” available.
Change your password often.
Your default password should be replaced with a strong, one-of-a-kind password.
Turn off remote access.
Turn off UPnP (Universal Plug and Play).
WPS (WiFi Protected Setup) functionality should be disabled.
You must abide by the aforementioned advice to prevent further attacks and keep yourself safe.