Linksys WiFi Gateway Remote Attack Risk Discovered 311
Glenn Fleishman writes "According to InternetNews.com, a tech consultant discovered that even if you turn the remote administration feature off on a Linksys WRT54G -- the single bestselling Wi-Fi device in the world -- you can still remotely access it through ports 80 and 443. Linksys sets the HTTP username to nothing and password to 'admin' on all of its devices by default. Web site scanning from anywhere in the world to devices that have routable Internet-facing addresses would allow script kiddie remote access, at which point you could flash the unit with new firmware, extract the WEP or WPA key, or just mess up someone's configuration and change the password."
Ummmmm....... (Score:5, Funny)
psst ... (Score:5, Funny)
All your gateways are belong to us (Score:4, Funny)
Well... (Score:5, Funny)
...anyone dumb enough to leave the router with the default password deserves to be h4x0red. I assume that by now pretty much anyone that owns a computer knows the need to create their own password not only for their PC but other devices/peripherals.
Although, I tried changing mine to "penis" and it returned a message saying: "Password is too small."
Go figure...
Simple, simple solution (Score:2, Funny)
Go "disruptive technology" ! (Score:0, Funny)
Re:What if some script kiddie meshed them all? (Score:3, Funny)
Wow, you could cluster 100 of these together and get the computing power of a Pentium III. Imagine what you could do with that kind of hardware.
Re:psst ... OFFTOPIC (Score:1, Funny)
|
WLAN3 -| | - WLAN 4
| |
`-------' -.
/ | \
WLAN 5 WLAN 6 WLAN 7
Check your reality.
The signals you are picking up might not be WLAN.
You might actually be living inside an experimental shoebox that's
being monitored by seven teams of scientists.