An issue related to both devices has been confirmed
by router manufacturers like Asus, Linksys, Netgear, TP - Link and Synology.
Not exact matches
Instead of buying expensive
routers from the traditional hardware vendors, these startups claim that you can instead install their own versions of specialized networking software into cheaper, commodity servers, like those sold
by the Taiwan - based
manufacturer Quanta.
The WiFi
router firmware sold
by the top
manufacturers contained versions of open source components with security vulnerabilities, the binary scans indicated.
Its research and development team scanned 32 pieces of WiFi
router firmware offered in the U.S., Europe and Asia
by more than 10 of the most popular home, SMB and enterprise - class WiFi
router manufacturers: Asus, Belkin, Buffalo, Cisco, D - Link, EFM, Huawei, Linksys, Netis and TP - Link.
Of course, third - party
router firmwares generally aren't supported
by the
router's
manufacturer.
This means that if, for example, a cafe is sued
by a troll for running Wi - Fi, the wireless
router manufacturer can intervene, and the cafe's case will be temporarily put on hold.
Some
router manufacturers avoid this problem
by actually using normal Wi - Fi encryption in guest mode.
When the
router manufacturers know about these exploits, they plug the holes
by issuing new software for the
router, called firmware.
It must be pointed out that the issue can only be fixed
by the Wi - Fi Alliance and not individual
router manufacturers as this pertains to the security of the Wi - Fi standard.
Measured
by breadth of features, no other
router manufacturer comes close to what Asus offers.
The situation has improved as wireless
router manufacturers began shipping with wireless passwords enabled
by default, but there are still too many unsecured Wi - Fi networks out there.
You won't find obscure back doors added
by the
router's
manufacturer in these alternative firmwares.
These include a worm dubbed The Moon, which infected Linksys
routers back in 2014, and which was stopped
by the
manufacturer issuing a firmware patch.
Ensure that your
router is secured
by 1) using an encryption key or password phrase to access your
router, 2) changing the
router default password that comes from the
manufacturer, since the default password can be easily guessed and allow a savvy person access to your
router, 3) use a WPA or WPA2 encryption key instead of WEP encryption, if possible, and 4) ensure that your
router firewall is turned on.