During installation, the router sent several data packets to an Amazon server in the US. These packets contained the configured SSID name and password in clear text, as well as some identification tokens for this network within a broader database and an access token for a user session that could potentially enable a MITM attack.

Linksys has refused to acknowledge/respond to the issue.

    • Imgonnatrythis@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      1
      ·
      6 months ago

      Have any good recs for nonconsumer wifi mesh system that is not too far off from consumer prices? I had a velop system for awhile and it was torture. This thing stems from horrid design and will likely always be awful. Use an Asus system now and have been happy with it. Used to run Asus systems with merlin, but admittedly running stock firmware now.

      • bobs_monkey@lemm.ee
        link
        fedilink
        English
        arrow-up
        14
        ·
        6 months ago

        Ubiquiti gear is very solid for the price. Start with their dream machine (check eBay for used, just saw one for $150, otherwise $300 new), and then add nano access points as needed. Enterprise gear for a fraction of the price.

        • Noobnarski@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          5 months ago

          You can also run the Network Controller on any PC or even Home Assistant if you dont need to do any advanced traffic routing features.

          The only disadvantage is that updates cannot be automatically applied while the network controller is off, the APs however do work fine without it, as long as they are configured once.

        • ikidd@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          1
          ·
          5 months ago

          Isn’t Ubiquiti back to being a “have to make a cloud account to control all your local devices” company?

          • bobs_monkey@lemm.ee
            link
            fedilink
            English
            arrow-up
            3
            ·
            5 months ago

            They’re either or. Their configuration device is called a cloud key, but it runs locally on your network. You can choose to enable cloud management, though everything can be administered locally, nor do they punish you for it.

      • yeehaw@lemmy.ca
        link
        fedilink
        English
        arrow-up
        6
        ·
        6 months ago

        Unifi is probably the best you’ll get for prosumer. Unfortunately it’s not without flaws either. I’d take it over the junk consumer brands any day still. Because I work in the industry and I like to use a lot more advanced things, I can’t get myself to use anything other than opnsense for home use. I have a protectli for hardware. You can install pfsense, opnsense, probably even ddwrt which is probably the most friendly of the bunch from what I hear. I use a ruckus poe fanless switch, but this is the least important for a typical home user network. Just get something that has poe and isn’t cloud managed 😂

        • ikidd@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          5 months ago

          I thought Ubiquiti moved back to cloud managed on everything? Or is that just the network cameras?

    • 0x0@programming.dev
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      3
      ·
      5 months ago

      You do know that enterprise doesn’t make you safer, right? Consumer gets hit by botnets, enterprise gets hit by higher level attacks.

      • yeehaw@lemmy.ca
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        5 months ago

        I don’t get your point. This isn’t an attack, this is a cheap consumer company doing what they do best and stealing your personal information because $ and other crap. If this happened in enterprise they’d be in so much shit with laws. Cisco, juniper, Aruba, etc are not going to be shipping off your passwords because that liability is going to be a big problem.

        Enterprise level stuff also charge top dollar and don’t need to sell your data to make more money.

        If enterprise level stuff we’re doing this intentionally they’d be out of business. This would not fly with SOC and other security designations.

        Additionally just because a consumer uses enterprise gear, that does not make them a larger target. I’m not Microsoft. No state attacker is going to want my worthless data.

        • 0x0@programming.dev
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          5 months ago

          Additionally just because a consumer uses enterprise gear, that does not make them a larger target.

          It’ll make them a target of attacks targeting that class of gear.

          • yeehaw@lemmy.ca
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            1
            ·
            5 months ago

            Most threat actors are looking at who owns what IP space and checking the IPs of that, or what other public info they can find (website address etc). Not chasing after someone with a consumer internet IP. There is just not the same incentive.