The devices with the highest number of vulnerabilities are the TP-Link Archer AX6000, with 32 flaws, and the Synology RT-2600ac, which has 30 security gaps.
The testing process
IoT Inspector researchers conducted the tests in collaboration with CHIP magazine, focusing on models mainly used by small businesses and households users.
"For the evaluation of the Chip, the magazine provided all the current models, which were upgraded to the latest firmware version," said Florian Lukavsky, CTO and founder of the IoT Inspector, at BleepingComputer.
"The routers were automatically analyzed by the IoT Inspector and checked for more than 5.000 CVEs and other security issues."
Their findings show that many of the routers are still vulnerable to vulnerabilities that have been publicly disclosed, even with the latest firmware as shown in the table below.
Although not all defects carry the same risk, the team found some common problems that affected most models:
- Outdated Linux kernel in firmware
- Outdated multimedia and VPN functions
- Excessive reliance on older versions of BusyBox
- Use weak default passwords such as "admin"
- Presence of credentials in plain text
Jan Wendenburg, CEO of the IoT Inspector, noted that one of the most important ways to secure a router is to change the default password when you first set up the device.
"Changing passwords during first use and h activation of modeof the automatic informations should be common practice across all IoT devices, whether the device is used at home or on a corporate network.”
The researchers did not publish much technical details about their findings, except in one case involving the extraction of the encryption key for D-Link router firmware.