Today I scanned my router with routersploit. The scan ended and showed one vulnerability: eseries_themoon_rce.

I searched the internet and found that this is a vulnerability in Linksys E-Series routers. But I am not on linksys at all. And I didn’t find anything about getting rid of it.

I’m wondering if someone knows how to make this vulnerability eliminate?

27 points

If your router isn’t even a Linksys router, then it’s most likely a false positive result and can be safely ignored. If you want to be extra sure, you could attempt to actually exploit the vulnerability with routersploit and see whether you get anywhere.

In general, the fix for a vulnerability in an end-user network device is some combination of “update the firmware” and “disable the vulnerable feature”.

permalink
report
reply
2 points

Hi, thank you for your answer. I solved the problem. I performed a router factory reset. After that I run the security test again and it didn’t find any vulnerabilities.

permalink
report
parent
reply
11 points

Looks like there’s a metasploit available. You can use that on your router to see if it’s susceptible. A quick google search indicates that this is only successful on older routers without input validation.

In general, follow good cyber security hygiene, and update the firmware on your router. If your router no longer is supported by the vendor (no more firmware updates for vulnerabilities found), then it’s old and you should upgrade.

permalink
report
reply
8 points

You might also be able to replace the firmware with something like DD-WRT or OpenWRT or Tomato or other third-party firmware.

permalink
report
parent
reply

Good idea.

You can still get the newest DD-WRT builds even on the WRT54G.
That is a Wi-Fi router from 2002.

Of course, the features are sort of limited. I tried the VPN build (on WRT54GL), but I couldn’t get the OpenVPN client to connect. I found some thread mentioning it may be missing something, but I don’t know if that’s the issue.

Anyway, without overclocking I’d expect like 2Mbps. I mean, it barely handles HTTPS. Just trying to load the WebUI maxes out the CPU for several seconds if trying to use HTTPS.
Perhaps it’s not missing anything software-wise, but it’s just so slow it times out during handshake.
So I just put the std build on it in case it will be useful at some point.

permalink
report
parent
reply
2 points

Thank you for advice and additional info. I bought a modern router Cudy WR3000 with WiFi-6 support. And it has the last firmware update available.

permalink
report
parent
reply

Technology

!technology@beehaw.org

Create post

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community’s icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

Community stats

  • 2.8K

    Monthly active users

  • 2.9K

    Posts

  • 53K

    Comments