this post was submitted on 09 Jul 2024
642 points (99.7% liked)

Technology

59589 readers
3077 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

During installation, the router sent several data packets to an Amazon server in the US. These packets contained the configured SSID name and password in clear text, as well as some identification tokens for this network within a broader database and an access token for a user session that could potentially enable a MITM attack.

Linksys has refused to acknowledge/respond to the issue.

you are viewing a single comment's thread
view the rest of the comments
[–] partial_accumen@lemmy.world 76 points 4 months ago (9 children)

Two important points raised:

  • Why is Linksys sending your Wifi details, as well as your private password, outside of your home
  • If they're doing it, why are they sending your critically important private information unencrypted onto the public internet

The answer to the first one may be semi-legit as these are mesh products. As in, the other nodes in the mesh will need this information, and it appears that Linksys has decided to store your security data in AWS for the other mesh nodes to retrieve it when you're setting it up. I'd sure as hell like to know this before the product does this. Further, I'd much prefer to simply attached to each mesh node myself to input the secured credentials instead of sending them outside to the internet.

There's not excuse for Linksys sending the creds unencrypted onto the internet.

[–] avidamoeba@lemmy.ca 2 points 4 months ago (6 children)

I'm just finding no confirmation that they send them unencrypted over the Internet and I've seen "researchers" calling sending passwords over HTTPS "unencrypted."

Mesh coordination is interesting. It's not great. That said I doubt that any off-the-shelf consumer mesh system does go through the work to keep things local-only. It's too easy to setup a cloud API and therefore likely all of them do that since it's the cheapest.

[–] Flashback956@feddit.nl 3 points 4 months ago (1 children)

How would they know that the device sends the SSID and password otherwise? If it was encrypted you would not be able to read the content of the packages.

[–] Natanael@slrpnk.net 2 points 4 months ago

If you get root on the device you can MITM it by extracting session keys

load more comments (4 replies)
load more comments (6 replies)