A host of home Wi-Fi routers based on Realtek silicon may be vulnerable to a remote code execution attack thanks to a hole in Realtek's software development kit (SDK).
To support the universal plug-and-play (UPnP) standard, Realtek built a service/daemon into its SDK that listens for UPnP calls. Unfortunately, the developers didn't implement a proper input sanitization for NewInternalClient call. As a result, the bad guys may be able to cause a Realtek-based device execute malicious code.
Here are a few resources to help identify if you have a SOHO router based on the Realtek 81xx-series SoC that may be vulnerable to attack.
realtek port:1900 net:[ip address]
Server: OS 1.0 UPnP/1.0 Realtek/V1.3
If you find that your router is vulnerable, you can protect yourself by disabling UPnP in the management interface. You'll also want to check to see if your vendor has announced a pending update to correct this flaw. Notably, D-Link is already at work on updates.
|Razer Kiyo and Seiren X set the stage for streaming excellence||9|
|MSI Cubi 3 Silent and Silent S can be seen but not heard||8|
|Massdrop's Vast 35" VA display lives up to its name||18|
|Spitballing the performance of Nvidia's purported GTX 1070 Ti||16|
|Friday deals: a huge monitor, racing gear, audio, and more||17|
|G.Skill 3800 MT/s SO-DIMMs put lightning in tiny bottles||7|
|Cooler Master bedazzles the MasterLiquid Lite ML120L and ML240L||3|
|Razer Electra V2 offers affordable immersion||6|
|Samsung 360 Round camera captures the world from all angles||11|