Ten security holes were found in more than 20 router models from Linksys
Security flaws in Linksys routers have been discovered by researchers, who found that vulnerable Wi-Fi routers could be exploited and turned into botnets.
Researcher Tao Sauvage from cyber security firm IOActive Group and independent researcher Antide Petit, uncovered ten separate vulnerabilities in more than 20 Linksys Smart Wi-Fi routers, and identified some 7,000 devices susceptible to exploitation.
Linksys security holes
The security flaws, if exploited, could be used to overload a targeted router and force it to reboot, as well as deny a legitimate user access to it, leak sensitive information about the router and devices connected to it, and change restricted settings.
“A number of the security flaws we found are associated with authentication, data sanitisation, privilege escalation, and information disclosure,” said Sauvage.
“Additionally, 11 percent of the active devices exposed were using default credentials, making them particularly susceptible to an attacker easily authenticating and potentially turning the routers into bots, similar to what happened in last year’s Mirai Denial of Service (DoS) attacks.”
IOActive informed Linksys of the vulnerabilities in January, and both companies have been working together to plug the security holes.
Currently, Linksys and IOActive have come up with a workaround to avoid the risks posed by the vulnerabilities, until Linksys pushes out a firmware patch in the coming weeks.
Linksys’s advisory advises users to enable automatic updates on their router, disable the Wi-Fi guest network if it’s not being used, and naturally change the default administrators password.
With the potential to turn Wi-Fi routers into botnets and wreak havoc in a similar vein to the Mirai botnet, such flaws are deeply problematic, particularity when the distribution of routers from established brands is worldwide.
Are you a security pro? Try our quiz!