Contact Contact Us


This week, we received several reports about router vulnerabilities. Some of Linksys’s E series wireless routers were found to contain vulnerabilities (CVE-2018-3953, CVE-2018-3954, CVE-2018-3955) that could allow an attacker to hijack the devices via an authenticated HTTP request sent to the network configuration and perform malicious activities such as taking control of devices and installing malware. The affected routers have reached end-of-life status, though they may still be sold by third-party resellers and distributors.

Researchers also found vulnerabilities (CVE-2018-10822, CVE-2018-10824, CVE-201810823) in eight D-Link models that could give an attacker full control over the devices. The vulnerabilities consist of a path traversal security gap that allows an attacker to read arbitrary files, passwords stored in plain text, and a shell command injection that enables an authenticated attacker to execute arbitrary code. Six of the eight models have reached end-of-life status.

Hackers are constantly hunting for routers with outdated firmware and weak passwords. They then compromise vulnerable routers and use them to carry out cyberattacks. To avoid having their routers compromised by hackers, we advise users to regularly update the firmware of their routers to the latest versions released by manufacturers. We also encourage users to adopt strong and unpredictable passwords that consist of a mix of upper- and lower-case letters, numbers, and symbols.

[1] Some Linksys wireless routers found to contain vulnerabilities, warns SingCERT
[2] Bug Trio Affecting Eight D-Link Models Leads to Full Compromise

Ensign InfoSecurity Singapore
30A Kallang Place
Singapore 339213

Tel: +65 6788 2882
Fax: +65 6788 3883