Your router is only vulnerable if:
- Your router is a mipsel (MIPS running in little-endian mode, this is what the worm is compiled for) device.
- Your router also has telnet, SSH or web-based interfaces available to the WAN, and
- Your username and password combinations are weak, OR the daemons that your firmware uses are exploitable.
- disable remote management
- change password
- upgradeable firmware
- change SSID
- MAC address filtering
- Stateful Packet Inspection (SPI) firewall. Run a ShieldsUP test for Common Ports and All Service Ports to check all ports are stealth
- disable DHCP if unnecessary
- disable uPnP if unnecessary
- change DNS servers to openDNS
- Block ping from WAN
- restrict to 802.11g mode only if all your devices can support it
No comments:
Post a Comment