During installation, the router sent several data packets to an Amazon server in the US. These packets contained the configured SSID name and password in clear text, as well as some identification tokens for this network within a broader database and an access token for a user session that could potentially enable a MITM attack.

Linksys has refused to acknowledge/respond to the issue.

  • 0x0@programming.dev
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    4 months ago

    Additionally just because a consumer uses enterprise gear, that does not make them a larger target.

    It’ll make them a target of attacks targeting that class of gear.

    • yeehaw@lemmy.ca
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      4 months ago

      Most threat actors are looking at who owns what IP space and checking the IPs of that, or what other public info they can find (website address etc). Not chasing after someone with a consumer internet IP. There is just not the same incentive.