Tom Wittbrodt wrote:
I admit I didn't read the fine print when I signed up with Verizon for
DSL service but I wasn't aware the company providing my DSL service
could push changes like this to my router without my involvement.
For what it might be worth, when I signed up for Speakeast
Michael ODonnell wrote:
FWIW:
http://apcmag.com/new-worm-can-infect-home-modemrouters.htm
___
gnhlug-discuss mailing list
gnhlug-discuss@mail.gnhlug.org
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss/
I'm not sure if this is in
On Fri, Mar 27, 2009 at 1:07 PM, Tom Wittbrodt tomwi...@gmail.com wrote:
I wasn't aware the company providing my DSL service
could push changes like this to my router without my involvement.
From what I've seen, most telco-provided CPE has this sort of
capability. (And as I always say, cable
FWIW:
http://apcmag.com/new-worm-can-infect-home-modemrouters.htm
___
gnhlug-discuss mailing list
gnhlug-discuss@mail.gnhlug.org
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss/
Summary:
1) IFF your router is MIPS based (Linksys)
2) AND IF you have telnet/SSH/http open to the WAN (and wireless someday?)
3) AND IF you have one of the 6000 logins with one of the 13,000 password
(week password)
THEN you're vulnerable.
I'd imagine it'd be easy for the bot to evolve to use