Linksys Routers Exploited By "TheMoon" 134
UnderAttack writes "A vulnerability in many Linksys routers, allowing for unauthenticated code execution, is being used to mass-exploit various Linksys routers right now. Infected routers will start scanning for vulnerable systems themselves, leading to a very fast spread of this 'worm.'"
Network company supplied routers vul'n (Score:5, Insightful)
Use this supplied router. Do NOT modify it.
But it has admin/admin as user name and password and is 192.168.1.1
Can I fix that.
Do NOT modify the settings on the supplied router.
*facepalm*
Re:That's impossible (Score:4, Insightful)
Last I checked vxworks is not linux...
It wasn't Trolling (Score:5, Insightful)
Trolling: "Gee, LinkSys uses Linux and it's an open source product. So much for the myth (or bullshit) that open source is more secure!" Or "See, open source is shit! Closed source would never have had this happen to it because this exploit could only have been found by seeingt he source!"
The GP, OTOH, mixed satire and sarcasm - a la "The Daily Show" and "Colbert Report" to poke fun at the false sense of security one may have with using open source and that regardless of the product we use, we all need to be vigilant with our security. Who knows what the intention of this worm is.
Also, I took the GP's comment as a little teasing at the expense of some of the rapid members of the open source community and the folks seem to jump on all the Windows failings and yet, brush aside similar failings in open source software.
I thought it was quite clever on a multitude of levels while expressing in very simple sentences.
Why is the admin port open to the public? (Score:5, Insightful)
pronunciation (Score:3, Insightful)