What's new

CVE-2021-20090 Vulnerability

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Phantomski

Regular Contributor
Great news, thanks guys. The four mentioned ASUS routers (albeit DSL versions) worried me a little, but good to know there are no hidden Arcadyan bits hidden in Asuswrt code.
 
It doesn't matter if Asus routers are vulnerable or not. The rule is very simple: no remote (WAN) access - no vulnerability. Remote (WAN) access to router's Web Interface shall not be enabled, full stop! If remote access is really needed the only secure solution is to use VPN.
 
Remote (WAN) access to router's Web Interface shall not be enabled, full stop! If remote access is really needed the only secure solution is to use VPN.
Absolutely.

That said, you can still execute an attack from vulnerable internal LAN device, via compromised WiFi, etc, etc. LAN only is neither a replacement nor mitigation for poor internal security, just creates smaller attack surface.

But as the saying goes, you have to succeed all the time. The attacker only once.
 

Similar threads

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top