this post was submitted on 25 Sep 2025
11 points (100.0% liked)

Cybersecurity

8646 readers
238 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
 

Is my network actually at any risk? Should I take any steps now that I'm not receiving security updates? This was a really expensive router and I'm going back to school so I'm definitely not going to be in the market for a new one for quite a while. Probably wouldn't be going back to tplink even if I did.

Thoughts?

you are viewing a single comment's thread
view the rest of the comments
[–] rekabis@lemmy.ca 3 points 2 months ago* (last edited 2 months ago)

All of the mainstream router manufacturers have critically insecure firmware. Nearly all routers ship with hundreds of vulnerabilities, and sometimes even zero-days, even when initially released.

It’s why it is so important to find and acquire routers that are capable of being re-flashed with third-party firmware such as DD-WRT or OpenWRT.

Check with the router database of each project to see if what you currently own is eligible. DD-WRT enjoys wider support but is more limited in functionality. OpenWRT is more powerful but needs more capable hardware to run on.