![]() ![]() Research from Ben-Gurion University (Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices) found this "issue" to be rather "widespread". All you need to do is Google to find them. They also list there default passwords online for quick troubleshooting and setup. This hardcoded password issue is not unique to ACT routers, this something most device manufacturers do. Saini also discovered that ACT's routers' management portals are accessible through the open Internet, by anyone. ![]() And unless you, the user, have manually not changed that hardcoded password, you are using one that is common to thousands of routers. This password is separate from your WiFi password, mind you. Saini found that these ACT routers come with a hardcoded password. If someone gains access to your router, he/she can highjack your connection. Your router is basically the hub through which all your Internet traffic passes through and all your devices connect to the Internet through the router. And while ACT's coverage area keeps growing, this security flaw has exposed the fact that some "questionable choices" were made by ACT while setting up routers for new connections.Īccording to the HuffPost report, "at least two models of TP Link routers, TL-WR850N and Archer C5 AC1200, as well as D-Link routers issued by the company, are set up in such a way that someone could easily gain access to the router management portal, block websites, steal login credentials or monitor Internet traffic passing through the router". Going by Telecom Regulatory Authority of India (TRAI) data, ACT is the third biggest wired broadband provider in the country, behind just Airtel and BSNL. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |