Welcome, Guest. Please login or register.

Author Topic: Over 4.8 million routers potentially vulnerable Proxying Bad Traffic for Botnets  (Read 231 times)

0 Members and 1 Guest are viewing this topic.

Offline 1bit

  • STAFF - Technical Expert
  • Must be an Admin?
  • ********
  • Posts: 8770
  • Gender: Male
    • Tech Forum
from KITZ facebook page/site i found out this:

http://forum.kitz.co.uk/index.php/topic,21354.0.html

she recommends : It may be worthwhile doing a grc.com port scan just to check that your ports 1900 and 5000 are stealthed. More info on the forum.

https://www.grc.com/port_1900.htm
https://www.grc.com/port_5000.htm
(probe this port)

KITZ listed some of the more popular affected routers but there are way more on the report linked on her page

Quote
Full list of affected manufacturers and models can be found in the report but I list below some of the more popular makes.

ASUS
DSL-AC68R, DSL-AC68U, DSL-N55U, DSL-N55U-B,
MTK7620, RT-AC3200, RT-AC51U, RT-AC52U, RT-AC53,
RT-AC53U, RT-AC54U, RT-AC55U, RT-AC55UHP, RT-
AC56R, RT-AC56S, RT-AC56U, RT-AC66R, RT-AC66U,
RT-AC66W, RT-AC68P, RT-AC68R, RT-AC68U, RT-AC68W,
RT-AC87R, RT-AC87U, RT-G32, RT-N10E, RT-N10LX, RT-
N10P, RT-N10PV2, RT-N10U, RT-N11P, RT-N12, RT-N12B1,
RT-N12C1, RT-N12D1, RT-N12E, RT-N12HP, RT-N12LX,
RT-N12VP, RT-N14U, RT-N14UHP, RT-N15U, RT-N16, RT-
N18U, RT-N53, RT-N56U, RT-N65R, RT-N65U, RT-N66R,
RT-N66U, RT-N66W, RTN13U, SP-AC2015, WL500

Belkin
F5D8635-4 v1, F9K1113 v5

DrayTek Corp.
Vigor300B

NETGEAR
R2000, WNDR3700, WNDR4300v2, WNR2000v4

ZyXel
Internet Center, Keenetic, Keenetic 4G, Keenetic DSL,
Keenetic Giga II, Keenetic II, Keenetic Lite II, Keenetic
Start, NBG-416N Internet Sharing Gateway, NBG-418N
Internet Sharing Gateway, NBG4615 Internet Sharing
Gateway, NBG5715 router, X150N Internet Gateway
Device
PlusNet VDSL Fibre 40/10
BT HomeHub 5B (Broadcom 63168) <---> ECI Dslam (Lantiq M41a)

 

Powered by EzPortal