During installation, the router sent several data packets to an Amazon server in the US. These packets contained the configured SSID name and password in clear text, as well as some identification tokens for this network within a broader database and an access token for a user session that could potentially enable a MITM attack.

Linksys has refused to acknowledge/respond to the issue.

  • Pacmanlives@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    Not a bad way to do it!

    I just went down the ubiquity dream machine and a real switch with APs in mesh mode

    • Admiral Patrick@dubvee.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      Nice!

      A drunk eBay excursion scored me 20 Aruba AP-105s for $12. Flashing OpenWRT to them was a brute, but they’re still going strong.

      I originally set them up to mesh on the 5 GHz and provide AP coverage on the 2.4, but since they’re PoE and didn’t come with adapters, I got rid of the mesh and just have one in every room.