Cisco Systems has issued a patch for a security flaw in one of its Linksys routers that could give hackers access to consumers" home networks.
Alan Rateliff II, an independent security consultant, on Friday said he discovered a vulnerability in the Linksys WRTS54G 802.11g wireless router. The flaw gives hackers a free pass into the Web-based configuration page of the router when the firewall function is turned off. When Rateliff originally tested the devices in March, he discovered that this vulnerability existed on two Linksys routers straight from the store. The default configuration on the products he tested used version 2.02.7 of the firmware, and they enabled access to the configuration page via ports 80 and 443.
When he tested new Linksys routers, using both firmware versions 2.02.7 and 2.02.2 earlier this week, he did not find the same flaw on routers that use the standard configuration settings. But he noticed that when the firewall is turned off on the devices, ports 80 and 443 are still open, allowing the configuration page to be easily accessed. Allowing easy access to configuration settings on a router is a security risk. Hackers could change settings of the router to launch spam and virus attacks, without the victim ever realizing what is going on. Attackers could also gain access to devices attached to the router, such as laptops and PCs. With an open door into the network, attackers could target unprotected individual machines and infect them with worms and viruses.