Modernizing Authentication — What It Takes to Transform Secure Access
Independent Security Evaluators (ISE) researchers have uncovered critical vulnerabilities in 13 small office/home office (SOHO) routers and wireless access points, allowing remote attackers to take control of the router's configuration settings or to bypass authentication and take control (h/t Softpedia).
"Our research indicates that a moderately skilled adversary with LAN or WLAN access can exploit all thirteen routers," the researchers write. "We also found that nearly all devices had critical security vulnerabilities that could be exploited by a remote adversary, resulting in router compromise and unauthorized remote control."
All 13 of the routers studied can be taken over from the local network, and 11 of the 13 can be taken over from the WAN.
The routers include the Linksys WRT310Nv2, Belkin F5D8236-4 v2, Belkin N300, Belkin N900, Netgear WNDR4700, TP-Link WR1043N, Verizon Actiontec, D-Link DIR-865L, and others.https://o1.qnsr.com/log/p.gif?;n=203;c=204634421;s=15939;x=7936;f=201702151714490;u=j;z=TIMESTAMP;a=20304455;e=i
The researchers note that the potential impact of the vulnerabilities is magnified by the fact that attackers can leverage the flaws to target not only the administrator, but any user on the network.
"A parent or child in the case of the home, any or all students behind a university router, or any guest or untrained user of a small office or enterprise network can be targeted and leveraged to gain full control of the SOHO networking device, which may also lead to additional attacks being launched against other users," the researchers write.
ISE has disclosed the vulnerabilities to each of the product vendors. The researchers plan to upgrade the firmware on all 13 routers in six months, then perform a reassessment to determine whether the security flaws have been mitigated.