Security researchers analyzed nine popular WiFi routers and discovered a total of 226 vulnerabilities, even when running the latest firmware.
The routers we tested are manufactured by Asus, AVM, D-Link, Netgear, Edimax, TP-Link, Synology and Linksys and are used by millions of people.
The devices with the highest number of vulnerabilities are TP-Link Archer AX6000, with 32 flaws, and the Synology RT-2600ac, which has 30 vulnerabilities.
Η procedure of the tests
The IoT Inspector researchers conducted the tests in collaboration with CHIP magazine, focusing on models used primarily by small businesses and home users.
"For Chip's evaluation, the magazine provided all current models, which were upgraded to the latest firmware version," said Florian Lukavsky, CTO and founder in IoT Inspector, BleepingComputer.
"The routers were automatically analyzed by the IoT Inspector and checked for more than 5.000 CVEs and other security issues."
Their findings show that many of the routers are still vulnerable to vulnerabilities that have been publicly disclosed, even with the latest firmware as shown in the table below.
Although not all defects carry the same risk, the team found some common problems that affected most models:
- Outdated Linux kernel in firmware
- Outdated multimedia and VPN functions
- Excessive reliance on older versions of BusyBox
- Use weak default passwords such as "admin"
- Presence of credentials in plain text
Jan Wendenburg, CEO of IoT Inspector, noted that one of the most important ways to secure a router is to change the default password when you first set it up. device.
"Changing passwords on first use and enabling auto-updating should be a common practice on all IoT devices, whether the device is used at home or on a corporate network."
The researchers did not publish much technical details about their findings, except in one case involving the extraction of the encryption key for D-Link router firmware.