Trending

#RouterSecurity

Latest posts tagged with #RouterSecurity on Bluesky

Latest Top
Trending

Posts tagged #RouterSecurity

Preview
CVE-2026-4164: Command Injection in Wavlink WL-WN578W2 CVE-2026-4164 is a command injection vulnerability identified in the Wavlink WL-WN578W2 router firmware version 221110. The vulnerability resides in the POST request handler of the /cgi-bin/wireless.cgi script, affecting functions such as D

Wavlink WL-WN578W2 (221110) faces CRITICAL command injection (CVE-2026-4164). Public exploit exists. Restrict web access, monitor logs, and upgrade when possible. Details: radar.offseq.com/threat/cve-2026-4164-com... #OffSeq #CVE #RouterSecurity

0 0 0 0
Preview
CVE-2026-4167: Stack-based Buffer Overflow in Belkin F9K1122 CVE-2026-4167 identifies a critical stack-based buffer overflow vulnerability in the Belkin F9K1122 router firmware version 1.00.33. The vulnerability resides in the formReboot function, which processes requests to the /goform/formReboot en

Belkin F9K1122 (fw 1.00.33) hit by HIGH severity stack overflow — remote code execution possible, no patch yet! Restrict access & monitor endpoints ASAP. radar.offseq.com/threat/cve-2026-4167-sta... #OffSeq #infosec #routersecurity

0 0 0 0
Preview
CVE-2026-4164: Command Injection in Wavlink WL-WN578W2 CVE-2026-4164 is a command injection vulnerability identified in the Wavlink WL-WN578W2 router firmware version 221110. The vulnerability resides in the POST request handler of the /cgi-bin/wireless.cgi script, affecting functions such as D

CRITICAL: CVE-2026-4164 in Wavlink WL-WN578W2 (v221110) enables remote command injection. Public exploit available — patch ASAP or restrict web access. radar.offseq.com/threat/cve-2026-4164-com... #OffSeq #RouterSecurity #CVE

0 0 0 0
Asus Routers Hijacked by KadNap Botnet for Malicious Proxies, Comprising Over 14,000 Devices The KadNap malware is creating a botnet from Asus routers, using a custom DHT protocol, Kademlia, to power a malicious proxy network.

Read the full report:
www.technadu.com/asus-routers...

💬 What steps do you take to secure your home or office routers? Share your thoughts below.
#Cybersecurity #Botnet #RouterSecurity #Malware #Infosec

0 0 0 0
Post image

Juniper PTX routers affected by critical RCE (CVE-2026-21902).
Unauthenticated attacker.
Root-level execution.
Service enabled by default.
Patched in latest Junos OS Evolved releases.
Router compromise = traffic vantage point + pivot risk...

#Infosec #RouterSecurity #CyberThreats #PatchNow

0 0 0 0
Preview
CVE-2026-3044: Stack-based Buffer Overflow in Tenda AC8 CVE-2026-3044 identifies a critical security vulnerability in the Tenda AC8 router firmware version 16.03.34.06. The vulnerability is a stack-based buffer overflow located in the webCgiGetUploadFile function of the HTTP daemon service, spec

Tenda AC8 routers (16.03.34.06) face HIGH severity stack buffer overflow — public exploit out. Restrict access, monitor /cgi-bin/UploadCfg, and prep for patches. 🔒 radar.offseq.com/threat/cve-2026-3044-sta... #OffSeq #RouterSecurity #Vuln

0 0 0 0
Preview
CVE-2026-2550: Unrestricted Upload in EFM iptime A6004MX A vulnerability was found in EFM iptime A6004MX 14.18.2. Affected is the function commit_vpncli_file_upload of the file /cgi/timepro.cgi. The manipulation results in unrestricted upload. The attack may be performed from remote. The exploit

CRITICAL: EFM iptime A6004MX (14.18.2) hit by CVE-2026-2550 — unrestricted remote upload flaw. Exploit is public, no vendor fix. Isolate now! radar.offseq.com/threat/cve-2026-2550-unr... #OffSeq #Vulnerability #RouterSecurity

0 0 0 0
Preview
CVE-2026-2120: OS Command Injection in D-Link DIR-823X CVE-2026-2120 is an OS command injection vulnerability identified in the D-Link DIR-823X router, version 250416. The vulnerability resides in the /goform/set_server_settings endpoint, part of the Configuration Parameter Handler component. S

D-Link DIR-823X routers (v250416) face a HIGH severity OS command injection flaw — public exploit available. Patch urgently or restrict admin access to mitigate risk. Details: radar.offseq.com/threat/cve-2026-2120-os-... #OffSeq #DLink #RouterSecurity

0 0 0 0
Post image

Critical vulnerability CVE-2025-14756 found in TP-Link Archer MR600 v5 routers. Immediate firmware update required to prevent potential exploits. #CyberSecurity #TPLink #RouterSecurity Link: thedailytechfeed.com/critical-vul...

0 0 0 0
Critical RCE Vulnerability in Legacy D-Link DSL Router Models Requires Device Replacement A critical RCE vulnerability in legacy D-Link DSL routers was exploited in November 2025, and no fix is available since these devices are EOL.

Details:
www.technadu.com/critical-rce...

#RCE #IoTSecurity #RouterSecurity #Infosec #VulnerabilityManagement

0 0 0 0
Post image

Legacy D-Link DSL routers are exposed to a critical RCE flaw with no patch coming.
Attackers can gain full control. Device replacement is the only fix.
Link in pinned comment.
#RCE #IoTSecurity #RouterSecurity #Infosec

0 0 1 0
BaseFortify CVE report screenshot showing CVSS 9.3 severity, EPSS score, affected D-Link models, and mitigation guidance.

BaseFortify CVE report screenshot showing CVSS 9.3 severity, EPSS score, affected D-Link models, and mitigation guidance.

⚠️ Why this matters:

Attackers can inject OS commands through the dnscfg.cgi endpoint. Affected routers are end-of-life and will not be patched.

🛡️ Mitigation:
• Replace affected devices
• Disable remote access
• Monitor DNS changes

#RouterSecurity #CommandInjection #IoTRisk

0 0 1 0
Post image

🚨 Thousands of ASUS routers have been compromised through unpatched vulnerabilities. Check if your device is infected and learn what to do next.
5gstore.com/blog/2025/12/30/asus-rou...
#CyberSecurity #ASUS #RouterSecurity #Infosec #5Gstore

0 0 0 0
Security threat visualization

Security threat visualization

CRITICAL: Tenda WH450 v1.0.0.18 has a remote stack overflow (CVE-2025-15007). Public exploit code out—restrict HTTP, monitor for attacks, and patch ASAP. radar.offseq.com/threat/cve-2025-15007-st... #OffSeq #CVE202515007 #RouterSecurity

0 0 0 0
Security threat visualization

Security threat visualization

Tenda FH1201 (v1.2.0.14[408]) hit by HIGH severity buffer overflow (CVE-2025-14995). Remote, unauthenticated exploit risk—no patch yet. Restrict access & monitor endpoints! radar.offseq.com/threat/cve-2025-14995-st... #OffSeq #RouterSecurity #Vulnera...

0 0 0 0
Preview
WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide Global Operation WrtHug exploits multiple ASUS WRT flaws to hijack tens of thousands of EoL routers.

WRThug exploits six ASUS WRT flaws to hijack routers — home networks are becoming prime turf for advanced attackers. Patch early, patch often. 📡⚠️ #RouterSecurity #HomeNetworkSafety

0 0 0 0
U.S. Government Moves to Ban TP-Link Routers Over National Security Threats

U.S. Government Moves to Ban TP-Link Routers Over National Security Threats

BREAKING: U.S. moves to ban TP-Link routers (65% market share!) over Chinese spying concerns 🚨 Full timeline, security fixes, and alternative router recommendations inside 👇
biggo.com/news/202510310924_TP-Lin...

#TPLink #RouterSecurity

0 0 0 0
Post image

81% of broadband users haven't changed their router's default admin password, exposing networks to hackers. Secure your devices now! #CyberSecurity #RouterSecurity #ProtectYourNetwork Link: thedailytechfeed.com/the-critical...

0 0 0 0

Tenda AC7 Router users, urgent! A critical remote buffer overflow (CVE-2025-11525) allows unauthenticated attackers full device control. Firmware 15.03.06.44 is affected. Update immediately to prevent takeover! #TendaVulnerability #RouterSecurity

0 0 0 0
Tenda brand logo: bold orange “tenda” wordmark on a white/transparent background, representing the affected router vendor.

Tenda brand logo: bold orange “tenda” wordmark on a white/transparent background, representing the affected router vendor.

⚠️ Tenda CH22 routers: remote buffer-overflow vulnerabilities publicly disclosed and exploitable. Update firmware ASAP to reduce risk.

Read: basefortify.eu/cve_reports/...

#IoTSecurity #RouterSecurity #Firmware

1 0 0 0
Security threat visualization

Security threat visualization

🚨 Tenda AC23 routers (≤16.03.07.52) have a HIGH severity buffer overflow (CVE-2025-11356). Remote, unauthenticated exploit possible. Disable remote mgmt & monitor for patches! radar.offseq.com/threat/cve-2025-11356-bu... #OffSeq #CVE202511356 #RouterSecurity

0 0 0 0
Security threat visualization

Security threat visualization

Tenda AC18 (15.03.05.19) faces a HIGH severity buffer overflow (CVE-2025-11325). Exploit is public—remote attackers can gain full control. Patch or restrict remote access now! radar.offseq.com/threat/cve-2025-11325-st... #OffSeq #infosec #routersecurity

1 0 0 0
Security threat visualization

Security threat visualization

Tenda AC8 routers (16.03.34.06) face HIGH-severity buffer overflow (CVE-2025-11120). Exploit is public—restrict admin access & monitor for abuse. Patch ASAP! radar.offseq.com/threat/cve-2025-11120-bu... #OffSeq #Vulnerability #RouterSecurity

0 0 0 0
Security threat visualization

Security threat visualization

TOTOLINK X6000R routers face a CRITICAL OS Command Injection flaw (CVE-2025-11005). Patch unavailable—restrict remote access, segment networks, and monitor traffic now! radar.offseq.com/threat/cve-2025-11005-cw... #OffSeq #CVE202511005 #RouterSecurity

0 0 0 0
Security threat visualization

Security threat visualization

B-Link BL-AC2100 (1.0.0–1.0.3) hit by HIGH severity stack buffer overflow—public exploit out, no fix. Restrict web interface, disable remote mgmt, monitor now! radar.offseq.com/threat/cve-2025-10773-st... #OffSeq #Vulnerability #RouterSecurity

0 0 0 0

Many IoT devices have poor security, with unaudited firmware and infrequent updates. This makes consumer routers vulnerable to exploitation. Users must be aware of these risks and secure their networks. 🔒 #RouterSecurity 2/5

0 0 1 0
Security threat visualization

Security threat visualization

HIGH severity alert: Mercury KM08-708H GiGA WiFi Wave2 v1.1 has a buffer overflow flaw. Exploit is public — restrict remote access & monitor routers now! radar.offseq.com/threat/cve-2025-10385-bu... #OffSeq #Vulnerability #RouterSecurity

0 0 0 0
Post image

Outdated routers = open doors for hackers.
If you’re still using Cisco RV, Linksys LRT, or Araknis AN-300 series, it’s time to update or upgrade now.
Read our latest blog to protect your network 👉 5gstore.com/blog/2025/09/05/outdated...
#CyberSecurity #RouterSecurity

1 0 1 0
Illustration of a D-Link router with glowing Wi-Fi signal

Illustration of a D-Link router with glowing Wi-Fi signal

⚠️ D-Link DIR-823X (CVE-2025-10123)

Command injection via Hostname in `/goform/set_static_leases` → RCE.

Mitigate: update firmware, disable WAN admin, restrict mgmt to LAN.

🔎 basefortify.eu/cve_reports/...

#CVE #DLink #IoT #RouterSecurity #InfoSec

3 0 0 0
Security threat visualization

Security threat visualization

High-severity alert: Buffer overflow in Tenda CH22 v1.0.0.1. Remote exploit public — segment networks, restrict /goform/SetSambaConf, and monitor traffic until patched. radar.offseq.com/threat/cve-2025-9813-buf... #OffSeq #Vulnerability #RouterSecurity

0 0 0 0