Introduction to lingke Router Security Vulnerabilities

Source: Internet
Author: User

We must be familiar with computer operating system vulnerabilities. In fact, vrouters and computers also have operating systems and vulnerabilities, this article describes in detail some problems related to the Linksys vro security vulnerability and how to prevent it. After research, the Linksys router has a security vulnerability. Attackers can remotely hijack the Linksys router through the network management console. 1. The Linksys router cannot correctly check the input address of the Access Management Console. Attackers can inject Shell commands to access the Linux operating system of the router, if you do not modify the default Administrator account and password, intruders can easily use this vulnerability to attack the vro. Www.2cto.com 2. After you log on to the network management interface, you can use simple injection technology to obtain advanced management permissions for the operating system. If the user does not change the default user name and password, intruders can use the CSRF technology to access the vro for remote management. They can also easily see the running service processes on the vro and their internal configurations. 3. For vro users in a LAN, the Network Management Console is open by default by the system. As long as you enter the LAN, even if you do not have the permission, you can simply attack the vro, therefore, it is easiest to initiate a vro attack from a local network. However, hackers outside the LAN can also remotely control the vro by using the CSRF technology or cross-site Request Forgery technology.
So far, lingke has not improved the effectiveness of this vulnerability. Therefore, it is best for users who are using the lingke router to change a safer and more complex user name and password to prevent hacker intrusion.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.