• Pxtl@lemmy.ca
    link
    fedilink
    English
    arrow-up
    10
    ·
    2 months ago

    Never turn on remote admin. You don’t need to admin your router from outside of your house.

      • Professorozone@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        I heard that a while ago many VPN services were bought by the very people you use a VPN to protect against. How do you know which ones are safe?

        • Evkob@lemmy.ca
          link
          fedilink
          English
          arrow-up
          8
          ·
          2 months ago

          I believe they mean setting up a VPN on your network, rather than buying a service from a VPN provider.

          Something like Wireguard lets you configure individual devices to access your network remotely.

          • sugar_in_your_tea@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 months ago

            Yup, I did that last week and it’s pretty easy. Basically:

            1. Set up a VPS and configure wireguard
            2. Set up your computer to connect to it (or your router if you literally only want remote admin); you’ll probably want to configure persistent connections
            3. Set up your phone to connect to it
            4. Test it at work sometime to make sure it all works

            I do it in two hops: connect to VPS then to internal computer. There are other configurations (e.g. talk to peer computers directly), but this works well for me.

        • Dultas@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          2 months ago

          This would be self hosted so you can access your own internal network. Wireguard on OpenVPN are your best options there, personally I use wireguard/pivpn.

        • Caboose12000@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          2 months ago

          The way to tell which ones are safe is to look up legal history for each company. When the home country of the company demands all the data they have, the companies are going to give all the data they have. So if a court order of a VPN yields nothing or almost nothing, then you know they really don’t save any logs.

          As someone else mentioned already, proton and mullvad are the good ones in, but that can change if either company gets bought out or changes management etc

        • sunzu@kbin.run
          link
          fedilink
          arrow-up
          1
          ·
          2 months ago

          proton and mullvad are the privacy focused choices, but you are still just trusting a third party to be pinky promise to keep no logs etc.

  • mox@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    4
    ·
    2 months ago

    Friendly reminder that OpenWrt exists, and is probably safer than the stock firmware in any consumer router.

    From a quick look, I see that at least one of the affected models has official OpenWrt support: the RT-AC68U

    • sugar_in_your_tea@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      ·
      2 months ago

      Another friendly reminder, enterprise-grade routers like Mikrotik are fantastic. They don’t have wifi builtin, so you may never need to upgrade it if you get fast enough uplink (mine is gigabit, so should be fine). You’ll need a separate AP (I got Ubiquiti). They’re way more feature complete than nonsense like these from ASUS, and they generally have more secure firmware.

    • Avid Amoeba@lemmy.ca
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Friendly reminder that OpenWrt supports Raspberry Pi and every Pi from 3 onwards makes for a great, inexpensive router. Adding WiFi can be done with any off-the-shelf WiFi router or access point, brand new or second hand. Since they aren’t exposed to the Internet, remote vulnerabilities are significantly mitigated.

      • Mazoku@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 months ago

        Yup. I use a CM4 with a DFRobot router board running openwrt. Works great.

  • shimura@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 months ago

    According to the CVE it looks like my XT8 is already updated beyond the affected version. It says through version 3.0.0.4.388_24609 and mine is version 3.0.0.4.388_24621.

    I also noticed this vulnerability was posted on May 29th with the last update being June 13th. Seems like this a report that’s already outdated.

  • RubberDuck@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    2 months ago

    That site… even the model list is an advertorial.

    • XT8 (ZenWiFi AX XT8)
    • XT8_V2 (ZenWiFi AX XT8 V2)
    • RT-AX88U
    • RT-AX58U
    • RT-AX57
    • RT-AC86U
    • RT-AC68U
    • bitchkat@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      Interestingly, I didn’t get any prompts. It did tell me to manually restart the router but once it did, no prompts. RT-AC68U running 3.0.0.4.386_51915