Security researchers analyzed nine popular WiFi routers and discovered a total of 226 vulnerabilities, even when running the latest firmware.
The routers we tested are manufactured by Asus, AVM, D-Link, Netgear, Edimax, TP-Link, Synology and Linksys and are used by millions of people.
The devices with the highest number of vulnerabilities are the TP-Link Archer AX6000, with 32 defects, and the Synology RT-2600ac, which has 30 security vulnerabilities.
Η procedure of the tests
IoT Inspector researchers conducted the tests in collaboration with CHIP magazine, focusing on models mainly used by small businesses and home users.
"For Chip evaluation, the magazine provided all current models, which were upgraded to the latest firmware version," Florian Lukavsky, CTO and founder at IoT Inspector, told BleepingComputer.
"The routers were automatically analyzed by IoT Inspector and checked for more than 5.000 CVEs and other security issues."
Their findings show that many of the routers are still vulnerable to vulnerabilities that have been publicly disclosed, even with the latest firmware as shown in the table below.
Although not all defects carry the same risk, the team found some common problems that affected most models:
- Outdated Linux kernel in firmware
- Outdated multimedia and VPN functions
- Excessive reliance on older versions of BusyBox
- Χρήση αδύναμων προεπιλεγμένων κωδικών πρόσβασης όπως "admin"
- Presence of credentials in plain text
Jan Wendenburg, CEO of the IoT Inspector, noted that one of the most important ways to secure a router is to change the default password when you first set up the device.
"Η αλλαγή κωδικών πρόσβασης κατά την πρώτη χρήση και η ενεργοποίηση της λειτουργίας της automaticς informationς πρέπει να είναι κοινή πρακτική σε όλες τις συσκευές IoT, είτε η συσκευή χρησιμοποιείται στο σπίτι είτε σε κάποιο εταιρικό δίκτυο."
The researchers did not publish much technical details about their findings, except in one case involving the extraction of the encryption key for D-Link router firmware.