Linksys ignores zero-day exploit discovered on DirecTV hardware
Researchers publicly disclosed a zero-day exploit in a piece of television hardware on Wednesday after trying to get the device maker to fix the flaw over the past few months. The device, Linksys WVBR0-25, is a wireless video bridge that DirecTV parent company AT&T gives to new customers for the satellite television service. A Trend Micro researcher and DirecTV customer found that, without authentication, the WVBR0-25 hands out information including connected clients and running processes. A wireless video bridge is an access point (similar to a router) used by DIRECTV to send signals to a user’s wireless set top boxes. The easy-to-exploit vulnerability allows hackers to potentially gain root access and take full control of the device. The device also fails to properly sanitize data and leaves the door wide open to remote attackers taking over the device, said Dustin Childs, director of communications for Trend Micro ZDI. Although the issue was reported over half a year ago by Trend Micro’s […]
The post Linksys ignores zero-day exploit discovered on DirecTV hardware appeared first on Cyberscoop.
Continue reading Linksys ignores zero-day exploit discovered on DirecTV hardware