Linksys Velop routers send Wi-Fi passwords in plaintext to US servers

Jul 14, 2024 4:30 PM

llebkcir

Views

38045

Likes

723

Dislikes

5

Oh Joy of Joys...

https://stackdiary.com/linksys-velop-routers-send-wi-fi-passwords-in-plaintext-to-us-servers/

According to Testaankoop, the Belgian equivalent of the Consumers’ Association, two types of Linksys routers are sending Wi-Fi login details in plaintext to Amazon (AWS) servers.

This discovery involves the Linksys Velop Pro 6E and Velop Pro 7 mesh routers.

During routine installation checks, Testaankoop detected several data packets being transmitted to an AWS server in the US. These packets included the configured SSID name and password in clear text, identification tokens for the network within a broader database, and an access token for a user session, potentially paving the way for a man-in-the-middle (MITM) attack.

An MITM attack is a security breach in which an attacker intercepts the communication between your Linksys router and the Amazon server without either party’s knowledge. In this context, it means the attacker could capture your Wi-Fi network name (SSID) and password as they are transmitted in plaintext, allowing them to read or alter these sensitive details and potentially gain unauthorized access to your network.

The consumer organization conducted these tests using the latest firmware available at the time. Despite warning Linksys in November, no effective measures have been taken.

The Velop 6E and 7 we tested had the most recent firmware. The Velop 6E was tested several times, the last time with firmware V 1.0.8 MX6200_1.0.8.215731 and the new Velop Pro 7 was tested with firmware 1.0.10.215314.

Testaankoop
Linksys released a firmware update after the initial warning, but it did not address the concerns raised. “We regret the lack of response from Linksys and expected more from such a renowned brand,” Testaankoop expressed.

Testaankoop suspects the security issue might stem from third-party software used in the Linksys firmware. However, they emphasize that this does not excuse the vulnerability. For those who already own the affected routers, they have recommended changing the Wi-Fi network name and password via the web interface instead of the app. This precaution prevents the SSID name and password from being transmitted in readable text.

Mesh routers like the Velop series are designed to improve Wi-Fi distribution in large or multi-story homes by creating a wireless network through multiple connected nodes. These nodes communicate either wirelessly or through cables to ensure better Wi-Fi coverage. However, the Velop Pro WiFi 6E and Pro 7’s data transmission practices undermine the security benefits they should provide.

Testaankoop contacted Linksys again just days before today’s publication in response to the ongoing issue, giving them a brief window to respond. However, they have not received any acknowledgment or solution from the manufacturer.

The vulnerability persists even in the latest Linksys 7 Pro, highlighting a critical security lapse. “After our long and intensive tests, we strongly advise against buying the Linksys Velop Pro WiFi 6E and Pro 7 because there is a serious risk of network intrusion and data loss,” the researchers concluded.

While breaching a network requires effort and technical skill (Linksys has done a lot of the heavy lifting here!), the attacker can cause extensive damage once inside. Linksys themselves recommend the Velop product line for small offices, making this issue particularly concerning for both personal and professional environments.

Stack Diary reached out to Linksys on July 9 to see if they plan on responding; as of July 14, we have yet to hear from them.

internet

technology

iot

Jokes on them, I don’t have passwords.

1 year ago | Likes 4 Dislikes 2

Ah yes, the classic admin admin.

1 year ago | Likes 2 Dislikes 0

Up vote for awareness.

1 year ago | Likes 83 Dislikes 3

.

1 year ago | Likes 1 Dislikes 1

Adding: Open source firmware is not only available for most routers, but usually adds features you can usually only get from high-end models

1 year ago | Likes 2 Dislikes 0

Amazon AWS. Why am I not surprised. This was probably part of the same cunty bullshit backdoor agreement to originally allow sidewalk to be automatically on....

Sidewalk..in case you have Amazon shit and don't know shit or keep up with shit )

https://www.reddit.com/r/HomeNetworking/s/GI7AxNi0Qi

1 year ago | Likes 1 Dislikes 0

The EU should smack them in the face

1 year ago | Likes 1 Dislikes 0

Now if only I knew how to ping them to reply with the unprotected password..

1 year ago | Likes 1 Dislikes 0

Systems that don't encrypt passwords should be illegal.

1 year ago | Likes 1 Dislikes 0

Aand this sort of thing is why I only buy routers I can put OpenWRT or similar on

1 year ago | Likes 1 Dislikes 0

Linksys has been kinda crap for decades now.

1 year ago | Likes 1 Dislikes 0

"The consumer organization conducted these tests using the latest firmware available at the time. Despite warning Linksys in November, no effective measures have been taken."
OH FFS

1 year ago | Likes 70 Dislikes 1

That feels like it should merit one of those really big GDPR fines.

1 year ago | Likes 22 Dislikes 0

Given that the data is being sent to the US, that's exactly where this is going. You can't just send customer data out of the EU.

1 year ago | Likes 13 Dislikes 1

I suspect they'll argue that it's not personally identifiable data.

1 year ago | Likes 5 Dislikes 0

I could be wrong, but I don't think any consumer data can be stored outside of the EU without an agreement.

1 year ago | Likes 4 Dislikes 1

Do. Not. Buy. Things. That. Insist. On. The. Cloud. Tplink Deco stuff insists you configure using their app and a cloud account, yet they sell the exact same routers (that don't look quite as stylish), with a local web front end and no cloud connection needed. The companies will keep doing this, as long as people keep buying this shit.

1 year ago | Likes 4 Dislikes 0

This is going to go so well in the EU

1 year ago | Likes 4 Dislikes 0

Lynksys went to shit when they were bought by Cisco. D. They have been dog shit ever since. Do not buy Linksys anything.

1 year ago | Likes 8 Dislikes 0

They arr owned by foxconn now so even worse

1 year ago | Likes 1 Dislikes 0

a 200+ million fine from the European Union seems appropriate

1 year ago | Likes 2 Dislikes 0

Nah....

Assets frozen and no protection.
Executives charges with felony fraud x number of units sold.

Imprisonment for each charge can be 10 years. Let's serve them concurrently.

New board appointed by judge as oversight for transition period.

The company survives along with employees who work...not executives who don't take action...cause being a leader...well that's what you are supposed to be.

1 year ago | Likes 1 Dislikes 0

So this is not good, but also not really bad. First off this has nothing to do with Amazon, AWS is just a hosting platform. Anyone can buy AWS server space and use it for w/e. Secondly having a SSID and passcode does you no good if you are not near the network that is using it. Could this be used for something bad? Maybe? But it would take alot. If you had the IP you could geolocate the general area, maybe with more data and some data dumps you could get a address, but then what? Any important

1 year ago | Likes 2 Dislikes 4

You do not store passwords plain-text... EVER. No exceptions.

1 year ago | Likes 2 Dislikes 1

You do not store passwords. Ever. What should have been sent was a salted hash of the password. Even encrypting them would be asinine. There is no reason for 1) it to be sent over plain text, and 2) for it to be any more than the salted hash.

1 year ago | Likes 2 Dislikes 0

Cool, getting downvoted for providing perspective as to what can and cant be done with a wifi password on a post that is clearly trying to incite panic for a situation that doesnt need panic, just caution. got it. With op talking about a mitm attack, which makes 0 sense at all. Of all the leaks going on right now this is so nothing to write home about. Tickmaster on the otherhand....

1 year ago | Likes 2 Dislikes 0

data is going to be encrypted with HTTPS anyways, the reason why doing things like banking across the internet is "secure". The encryption is from your PC to their server, not from your router to their server.

1 year ago | Likes 2 Dislikes 4

It's quite bad in several ways.
1. There's a certain amount of stolen data _about you_ available for sale on the darkweb right now. If you ever owned one of these routers, there's now one more way that data could include your wifi password.

2. If this router was failing at such basic security hygene, what other incompetent bullshit is going on with it?
3. When linksys are told their product's security is broken, they fail to respond (or fix) for 10 months.

1 year ago | Likes 2 Dislikes 1

I'd accept the general premise of your point - wifi is generally pretty insecure, and I'd never trust it absolutely.

My bigger concern with this disclosure is as a canary in the coalmine - it suggests that security is a much much lower priority for linksys than i'd consider acceptable for a networking company.

1 year ago | Likes 2 Dislikes 0

Big IT company sucks at IT security, news at 11. Nothing new under the sun here folks, you really honestly don't want to know the kind of idiocy that goes on behind the scenes at larger firms.

1 year ago | Likes 3 Dislikes 0

I wouldn't count on the smaller firms either, at least not without some evidence first.

1 year ago | Likes 1 Dislikes 0

Oh for sure, but smaller firms do it better on average. (there's a pun in here somewhere...). Besides the whole "in plain text" thing in this case there's also the question of "why the fuck you sending that info out to begin with". So either someone at Linksys backdoored the firmware, or Linksys is farming it for their own purposes. Both are incredibly bad...

1 year ago | Likes 1 Dislikes 0

What is this, CD Universe circa 1996? We can create AI but not encrypt our security information.

1 year ago | Likes 5 Dislikes 0

First, that info should not be sent to anybody. Not even encrypted. Encrypted is wrong, passwords should be hashed (and salted). So, this is wrong on multiple levels.

1 year ago | Likes 2 Dislikes 0

Agreed. The fact plain text files are still used in this manner is insane.

1 year ago | Likes 1 Dislikes 0

My primary point; They should not send it in any way, because it should not be sent. That they do it insecurely is just even more stupid.

1 year ago | Likes 2 Dislikes 0

I remember a job years ago where they began for the first time securing SQA servers across the three geo units due to a hack. Turns out all the SQL servers at our one site had two unused but accessible admin accounts that still used the vendor default passwords. The default accounts had never been disabled nor were they made compliant with then-existing security policies on IT systems. Just one of those gaps because no one did a full audit of those systems.

1 year ago | Likes 1 Dislikes 0

Why I’m still on the good ole Linksys WRT54G.

1 year ago | Likes 21 Dislikes 0

lol I think I had that one. I must’ve bought it…20 years ago? All I really remember is endlessly putting them on the shelf when I worked at Best Buy.

1 year ago | Likes 4 Dislikes 0

Which probably has even worse overall security than the Velop

1 year ago | Likes 2 Dislikes 1

[deleted]

[deleted]

1 year ago (deleted Jul 15, 2024 4:24 AM) | Likes 0 Dislikes 0

OK well if you were using the stock firmware I’d be correct

1 year ago | Likes 2 Dislikes 0

That's what DD-WRT is for.

1 year ago | Likes 8 Dislikes 0

Please tell me you've got 3rd party firmware like ddwrt or tomato.

1 year ago | Likes 4 Dislikes 0

Man if you believe I really run a 20 year old router and didn’t just say that for teh lulz I don’t know what to tell you.

1 year ago | Likes 2 Dislikes 0

Awww I was hoping.....

1 year ago | Likes 1 Dislikes 0

As a non IT person... It feels like they shouldn't be doing that

1 year ago | Likes 233 Dislikes 1

As a sysadmin I can't tell you everything about for example networks. But I know they SHOULD NOT DO THIS!! Plaintext passwords are bad m'kay?

1 year ago | Likes 5 Dislikes 0

Um. Sending my fucking password to an external server is bad, mkay? I don't care what they think is a good excuse, the router is in range of my damn phone, send it directly. Hell, of their exist is that the router downloads it's configuration from their server, that just means that they could change my network settings without my consent as well.

This is enough to make me not buy anything Linksys for the next decade or so.

1 year ago | Likes 3 Dislikes 2

It's pretty much the fashion for a lot of high-end home network equipment these days.

They bill it as "cloud managed" (read: you can buy two of our devices and they'll automagically get the same SSID/pw); in reality it's a transparent attempt to lock people into an ecosystem.

1 year ago | Likes 1 Dislikes 0

Oh, it is, and it can be done in a way that those credentials never even leave my home, which would still help her people into the ecosystem.

This is incompetence bordering on malice. And no, that's not hyperbole, you can be damn sure that the execs love that this particular flow means that your device will stop working soon after they turn off the cloud service.

1 year ago | Likes 1 Dislikes 1

https://youtu.be/1u5jO57eD-U

1 year ago | Likes 2 Dislikes 0

1 year ago | Likes 1 Dislikes 0

1 year ago | Likes 2 Dislikes 0

as an IT person... They should NOT be doing that

1 year ago | Likes 35 Dislikes 1

As an IT person who has done some infosec work. There are hackers world wide who are now intercepting this data. Likely there were many before, but now everyone is doing it.
And given the rate that routers are patched by their owners, thsi will be a long term issue.

1 year ago | Likes 1 Dislikes 0

As a non IT person but very tech savvy, they should NOT be doing that.

1 year ago | Likes 6 Dislikes 0

As a person that does that, I should not be an IT.

1 year ago | Likes 4 Dislikes 0

And as a non-IT person, you would know enough to be right about it. Some security auditor for companies handling paiement information in the UK could learn a thing or two from you https://serverfault.com/questions/293217/our-security-auditor-is-an-idiot-how-do-i-give-him-the-information-he-wants

1 year ago | Likes 2 Dislikes 0

Swiss cheese man, wrapped with ducttape. Good thing you cant see shoddy work when its just bits and bytes...

1 year ago | Likes 6 Dislikes 1

I like Swiss cheese... With rye and pastrami...

1 year ago | Likes 1 Dislikes 0

It's the equivalent of writing your username and password on a post card and mailing it back home

1 year ago | Likes 83 Dislikes 1

Reminds me of the guy that robbed a bank and used his gasbill as the note. Different but the example you gave reminded me of it

1 year ago | Likes 1 Dislikes 0

Worse, it's mailing it to a third party to then sell to anyone they want

1 year ago | Likes 12 Dislikes 0

"Signed, hunter2"

1 year ago | Likes 4 Dislikes 0

A bit more: Doing what this guy said while putting a sign on your mail box saying you do so.

1 year ago | Likes 3 Dislikes 0

worse your not sending the post card to your home you send it to a business location. and it was not you that wrote/sent that password.

1 year ago | Likes 1 Dislikes 0

Even that method is more secure. It's a coin toss should a later section sorter decide to review the note on the card. Because by that point it has already been regionally and timeframe sorted. So as to arrive by the level of investment it can afford.

1 year ago | Likes 3 Dislikes 0

Oh I’m sorry, we shouldn’t be doing that?

1 year ago | Likes 19 Dislikes 0

Do you also leave copies of your house key physical address and a list of hours you aren't at home laying around in bad neighborhoods?

1 year ago | Likes 2 Dislikes 0

Only on Thursdays.

1 year ago | Likes 4 Dislikes 0