A report last week about a security hole in a wireless broadband router made by Cisco Systems' Linksys division...
overstated the severity of the vulnerability, according to the man who first warned of the problem.
Independent technology consultant Alan Rateliff said that Cisco's Linksys WRT54G wireless routers are not, by default, vulnerable to remote takeover from a malicious hacker.
However, a vulnerability in the software that runs on those devices could still allow a malicious hacker to access administrative features for the router and take control of the device.
Rateliff first posted a warning about the WRT54G on the Bugtraq discussion list on 31 May.
Based on testing with a sample Cisco router, Rateliff concluded that the routers were shipped with a configuration that would allow remote attackers to access the web-based administration interface for the devices over two common communications ports, 80 and 443.
The WRT54G, like other wireless routers, enables multiple computers to share a broadband internet connection using wireless networking equipment
After testing additional WRT54G devices, Rateliff said he found that the devices were not vulnerable in their default configuration, but could still be compromised remotely given the right circumstances.
In particular, Rateliff discovered that a firewall feature in the routers is enabled, rather than disabled, by default, which prevents compromise on systems.
On versions of the router using software (or "firmware") versions 2.02.2 and 2.02.7, malicious hackers can access the router's administrator interface and change the configuration of the router if the firewall feature is disabled and if the router's owner does not change the default administrator's password.
The devices could be compromised regardless of whether a feature that provides remote, web-based access to the routers was enabled or disabled, he said.
Cisco has since released a beta version of software for the device that fixes the remote access problem.
Paul Roberts writes for IDG News Service