It's amazing how damn lazy vendors can actually be sometimes. Two years ago in the midst of some other things, it was discovered that quite a few home network routers (Linksys included) would fail when presented with a DCC request involving bogus port numbers, which would result in an immediate disconnection of the session in use by a user's IRC client. Relatively simple to fix, or so you'd think. Today I've learned that even the latest firmware for the WRT54G2 is still vulnerable despite it being impossible to miss that this issue has been around for over two years now. This despite the fact that the firmware is 1.0.01, build three, and was released on Apr 29, 2008. Linksys DOS vulnerability still exists after two years |