Critical Vulnerabilities Impact Millions Of D-Link Routers: Patch Now!
In a significant security alert, millions of D-Link routers are at risk due to critical vulnerabilities that have been discovered in several models, including the DIR-X5460 and DIR-X4860.
These vulnerabilities could allow remote attackers...
Critical Vulnerabilities In Netgear Routers Let Attackers Bypass Authentication
Security analysis identified multiple vulnerabilities in the Netgear WNR614 JNR1010V2 N300 router (firmware V1.1.0.54_1.0.1) that could allow attackers to bypass authentication and access the router's administrative interface.
This is due to improper authentication protocols and...
Critical Flaw In SkyBridge Routers Let Attackers Inject Commands
A new vulnerability has been discovered in SkyBridge/SkyBridge BASIC series products that were associated with Command injection.
This vulnerability has been assigned to CVE-2024-32850, and its severity has yet to be categorized.
However, this vulnerability has...
Hackers Compromised 600,000 SOHO Routers Within 72 Hours For Botnet
Hackers often target the routers to take charge of network traffic, get hold of sensitive data, and attack attached devices.
When a router is hacked, it can create a botnet for major cyber-attacks or send...
TP-Link Archer C5400X Router Flaw Let Attacker Hack Devices Remotely
Hackers often target routers as the gateways that connect devices and networks to the internet.
Besides this, they are lucrative targets for threat actors since they are often overlooked regarding security updates and patches.
Cybersecurity researchers...
Gafgyt Malware Actively Attacking Zyxel Router Command Injection Flaw
The ZyXEL router has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user.
In the ever-evolving landscape of cyber threats, a resurgence of attacks on legacy...
Thousands of Vulnerable TP-Link Routers Can be Exploited By Multiple Hackers
Researchers found that there are thousands of TP-Link routers used all over the globe that are vulnerable to exploitation by several hacking groups.
Hackers from the following countries may be able to exploit these vulnerable...