Security News
Cisco Systems said it will not fix a critical vulnerability found in three of its SOHO router models. The three Cisco router models and one VPN firewall device are of varying age and have reached "End of life" and will not be patched, according to Cisco.
The Archer AX5400 features the latest-generation in Wi-Fi 6 technology, equipped with HE160 and 1024-QAM, offering 25 percent faster data speeds and six streams of simultaneous transmissions for improved network efficiency and bandwidth to enjoy the benefits of a buffer-free experience while streaming, downloading, gaming and more, all at the same time. "We are thrilled to be releasing the Archer AX5400, featuring the latest in Wi-Fi 6 and wireless networking advancements," said Jeff Barney, COO at TP-Link USA. "Users will enjoy blazing fast wireless speeds over six simultaneous streams, with 4x more capacity for today's smart homes. Not only future-proofing their home network but enjoying the latest security features such as enhanced IoT protection."
After taking over the domains for the notorious Coinhive in-browsing Monero mining service, a researcher is now displaying alerts on hacked websites that are still injecting the mining service's JavaScript. Two years later, CoinHive is still injected on sites.
A popular line of small business routers made by Cisco Systems are vulnerable to a high-severity vulnerability. Cisco issued fixes on Wednesday for the flaw in its RV132W ADSL2+ Wireless-N VPN routers and RV134W VDSL2 Wireless-AC VPN routers.
This report is six months old, and I don't know anything about the organization that produced it, but it has some alarming data about router security. Many routers are powered by very old versions of Linux.
Inseego announced that its new Wavemaker PRO 5G indoor router has been certified for use in Europe, North America and Australia, with additional regulatory certifications pending for other international markets. "Our Wavemaker PRO 5G solutions are changing the way enterprise and SMB customers think about broadband access," said Inseego President Ashish Sharma.
Cisco has addressed a clutch of critical vulnerabilities in its small business and VPN routers that can be exploited by an unauthenticated, remote attacker to execute arbitrary code as the root user. Some of the affected devices are also Wi-Fi routers, so could well be in everyday use.
Cisco has rolled out fixes for multiple critical vulnerabilities in the web-based management interface of Small Business routers that could potentially allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device. The flaws - tracked from CVE-2021-1289 through CVE-2021-1295 - impact RV160, RV160W, RV260, RV260P, and RV260W VPN routers running a firmware release earlier than Release 1.0.01.02.
Cisco this week released software updates to address multiple vulnerabilities across its product portfolio, including critical severity bugs in several small business VPN routers and SD-WAN products. The company warned that the web-based management interface of small business RV160, RV160W, RV260, RV260P, and RV260W VPN routers is affected by seven severe vulnerabilities that could be abused by unauthenticated, remote attackers to execute arbitrary code as root.
Cisco is rolling out fixes for critical holes in its lineup of small-business VPN routers. The flaws exist in the web-based management interface of Cisco's small-business lineup of VPN routers.