Preventing The New Linksys Firmware DDoS Vulnerability

Here we go again. Unfortunately, with stock router firmware vulnerabilities are nothing new. Netgear routers were recently affected by a bug in their firmware. Additionally, D-Link was affected by a vulnerability which was patched in Spring of last year. Previously, Asus was in legal trouble with the FTC for known security flaws in their firmware.

Linksys experiences bugs as well. Security researchers at IOActive are identifying several vulnerabilities in Linksys router firmware. These vulnerabilities allow hackers to bypass authentication and perform denial of service (DDoS) attacks.

The good news? Linksys is working on a fix for the vulnerabilities. The bad news? This issue affects more than two dozen models of Linksys wireless routers in the WRT and EA series. You can see the full list of in-danger models here:

From the WRT series: WRT1200AC, WRT1900AC, WRT1900ACS, WRT3200ACM

From the EA series: EA2700, EA2750, EA3500, EA4500 v3, EA6100, EA6200, EA6300, EA6350 v2, EA6350 v3, EA6400, EA6500, EA6700, EA6900, EA7300, EA7400, EA7500, EA8300, EA8500, EA9200, EA9400, EA9500

How To Protect Yourself From Linksys Firmware Vulnerabilities

We recommend a FlashRouter with open source DD-WRT firmware. Flashing a router with open-source firmware completely replaces the stock Linksys firmware (and it’s security flaws) normally found on these models. Furthermore, this makes the router more stable and more secure by allowing for an array of benefits including advanced security features.

The most popular Linksys model we offer is the Linksys WRT1900ACS DD-WRT router. It has a 1.6 GHz Marvell processor and 4 external antennas. This makes it a fantastic balance of range and power.

Need a bit more power? There’s also the Linksys WRT3200ACM DD-WRT. It also has 4 external antennas but has a 1.8 Ghz processor. What does the “M” in “ACM” stand for? The “M” stands for MU-MIMO. MU-MIMO allows for the router to communicate with multiple devices simultaneously. This increases the speed of the WiFi network, by limiting interference between devices.

Already Own A Linksys Router?

Additionally, if you already own a Linksys model that we support, we can flash it remotely with DD-WRT firmware with our remote support plans. After purchasing a support plan, simply email our support team to setup a remote TeamViewer session and they will remotely flash your router with DD-WRT firmware

Have Any Additional Questions?

Reach out to our friendly and helpful sales staff and we’ll be happy to answer any questions you may have and provide whatever expertise to help you find the best solution for you.

6 thoughts on “Preventing The New Linksys Firmware DDoS Vulnerability

  1. David Kaplan

    I just saw an email from Flash Router with the heading: PREVENTING THE NEW LINKSYS FIRMWARE DDOS VULNERABILITY. I found it difficult to understand what you were suggesting. I have two Linksys WRT1900ACS DD-WRT routers. One I bought through FlashRouter, the other I did not. From your email,

    I think you said that the one I bought through Flash Router should not be vulnerable because you replaced the firmware already.

    I think you said the one I bought from another source is vulnerable, but Linksys is working on an update that should address the issue (which I expect gets downloaded automatically from Linksys as an update as soon as it is available).

    This means that your point is that if I want to get ahead of the update, I do it by paying the service fee to you. If I want to wait, presumably the issue gets taken care of in time anyway by Linksys.

    Is my understanding correct?

    1. admin

      Hey David,

      Yes if you wish to wait to fix this vulnerability you can await and update and hopefully it fixes the issue and is fully vetted to not cause other issues by being rushed out. But the other point is that DD-WRT and other open source firmware do a good job of preemptively removing or not having these type of recurring issues.

      In fact, just yesterday another Asus firmware issue was exposed so while we are not against people using the firmware that they wish we are trying to inform of what we believe s continually and most often the better option from a security perspective.

    1. admin

      No Ron.

      If you have one of our routers, we remove and replace the faulty firmware by default and are not susceptible to these issues.


Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.