Linksys-routers Vulnerable due to multiple cgi-scripts
Linksys routers ranging from model EA6100 up-to EA6300 are Vulnerable and exploitable due to multiple cgi-scripts. The scripts can be used by an unauthorized attacker, which can get them access to the master password of the device.
Linksys' EA6100-6300 wireless routers will need a patch reports the register: KoreLogic has published an advisory saying that CGI scripts in the admin interface open the device up to remote attackers. Since it's a consumer product the risk is high that most of the devices out there never would be patched. The bad scripts include the bootloader, sysinfo.cgi, ezwifi_cfg.cgi, qos_info.cgi and others.
The disclosure is attributed to Matt Bergin of KoreLogic. His proof-of-concept code provided with the advisory includes testing the target device to see if its admin password remains set to default. At the time of writing, Linksys has not published a fix, so it's at the very least recommended to shut down remote admin access to any devices you're in contact with.
Senior Member
Posts: 11835
Joined: 2011-12-31
Ugh .. I really should replace mine with an Asus or TP-link.
Senior Member
Posts: 191
Joined: 2015-08-21
Pfsense ftw.
Junior Member
Posts: 7
Joined: 2015-08-04
My decision to stay away from Linksys for a while after the 2012 Cisco Connect Cloud saga has been well founded, knew these guys needed to learn a few things before they could be trusted again.
Senior Member
Posts: 7186
Joined: 2005-12-02
If you can, do so. Just moved, I'm on my 2nd ASUS router running DD-WRT. Gave my parents the old one considering I put some scripts and what not in place to clear old stuff and reboot once a week.
Unregistered
EA-6300V1?? that's also same as EA6400 is also affected?