Zyxel: Difference between revisions

Kloosy goosy (talk | contribs)
No edit summary
 
Line 16: Line 16:
Zyxel released a statement where they have no plans to release a patch for two actively exploited flaws in its routers, potentially affecting thousands of customers.
Zyxel released a statement where they have no plans to release a patch for two actively exploited flaws in its routers, potentially affecting thousands of customers.


Zyxel advised customers to buy new routers despite the affected routers were still possible to buy online.<ref>{{Cite web |date=2025-02-04 |title=Zyxel security advisory for command injection and insecure default credentials vulnerabilities in certain legacy DSL CPE |url=https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 |url-status=live |archive-url=https://web.archive.org/web/20250209091247/https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 |archive-date=2025-02-09 |website=Zyxel}}</ref><ref>{{Cite web |last=Page |first=Carly |date=5 Feb 2025 |title=Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers |url=https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/ |url-status=live |access-date=28 Mar 2025 |website=TechCrunch}}</ref><ref>{{Cite web |last=Whittaker |first=Zack |date=5 Feb 2025 |title=Wow. Router maker Zyxel says it has no plans to release a patch for two *actively exploited* flaws in its routers affecting potentially thousands of customers. Instead, Zyxel is advising customers to rip out affected devices and buy new routers. However, the affected buggy routers are still available for purchase. |url=https://mastodon.social/@zackwhittaker/113951421812871589 |url-status=live |access-date=28 Mar 2025 |website=Mastodon}}</ref>
Zyxel advised customers to buy new routers despite the fact that the affected routers were still possible to buy online.<ref>{{Cite web |date=2025-02-04 |title=Zyxel security advisory for command injection and insecure default credentials vulnerabilities in certain legacy DSL CPE |url=https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 |url-status=live |archive-url=https://web.archive.org/web/20250209091247/https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 |archive-date=2025-02-09 |website=Zyxel}}</ref><ref>{{Cite web |last=Page |first=Carly |date=5 Feb 2025 |title=Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers |url=https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/ |url-status=live |access-date=28 Mar 2025 |website=TechCrunch}}</ref><ref>{{Cite web |last=Whittaker |first=Zack |date=5 Feb 2025 |title=Wow. Router maker Zyxel says it has no plans to release a patch for two *actively exploited* flaws in its routers affecting potentially thousands of customers. Instead, Zyxel is advising customers to rip out affected devices and buy new routers. However, the affected buggy routers are still available for purchase. |url=https://mastodon.social/@zackwhittaker/113951421812871589 |url-status=live |access-date=28 Mar 2025 |website=Mastodon}}</ref>


==References==
==References==