a remote root access vulnerability in the default installation of some Cisco Linksys ( now Belkin ) routers . The flaw was actually foundVulnerability-related.DiscoverVulnerabilityin Broadcom ’ s UPnP implementation used in popular routers , and ultimately the researchers extendedVulnerability-related.DiscoverVulnerabilitythe list of vulnerable routers to encompass devices manufactured by the likes of ASUS , D-Link , Zyxel , US Robotics , TP-Link , Netgear , and others . “ Back in the days , Cisco fixedVulnerability-related.PatchVulnerabilitythe vulnerability , but we are not sure about all other router vendors and models because there are too many of them , ” the DefenseCode team noted . When DefenseCode first came outVulnerability-related.DiscoverVulnerabilitywith the vulnerability in 2013 , Rapid7 researchers also foundVulnerability-related.DiscoverVulnerabilitya number of flaws in other popular UPnP implementations , and by scanning the Internet , revealedVulnerability-related.DiscoverVulnerabilitythat there were approximately 15 million devices with a vulnerable Broadcom UPnP implementation . It ’ s difficult to tell how many of these devices are still vulnerableVulnerability-related.DiscoverVulnerabilitybut , as DefenseCode ’ s Leon Juranic pointed out to me , users rarely ( if ever ) update their router ’ s firmware , so there are bound to be still many of them . And given how many people have watched and analyzed their technical video of the exploit in action over the years , obviously many are interested in it . Still , I think we can all agree , four years is more than enough time for patchingVulnerability-related.PatchVulnerability, and nobody can fault them for publishing the exploit . Hopefully , if there are manufacturers that still haven ’ t pushed outVulnerability-related.PatchVulnerabilitya patch they ’ ll do it now , but this is could also be a welcome impetus for users to update their router ’ s firmware – especially those that haven ’ t done it for years . Whitepapers and offers