this post was submitted on 15 Feb 2024
140 points (96.7% liked)

World News

40412 readers
4282 users here now

A community for discussing events around the World

Rules:

Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.

We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.

All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.


Lemmy World Partners

News [email protected]

Politics [email protected]

World Politics [email protected]


Recommendations

For Firefox users, there is media bias / propaganda / fact check plugin.

https://addons.mozilla.org/en-US/firefox/addon/media-bias-fact-check/

founded 2 years ago
MODERATORS
140
submitted 11 months ago* (last edited 11 months ago) by Wilshire to c/world
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 11 months ago* (last edited 11 months ago) (2 children)

OpenWrt has an admin password and UI as well. I hope you changed the former and blocked the latter on external ports, before connecting it to the internet.

[–] AlpacaChariot 2 points 11 months ago (2 children)

Yes of course I changed the root password, I think it would actually be quite difficult not to do that on OpenWrt as it warns you if the password isn't set.

Was the exploit not related to unifi's remote / cloud administration features? That's how I read it, unless they mean remote admin that was installed by the malware.

[–] [email protected] 2 points 11 months ago (1 children)

UniFi and Edge are different product lines. UniFi uses a controller (local or cloud-based) and edge products are the more traditional interface on the device itself.

The article clearly states that edgerouter is the affected product, which means the default password and remote admin interface were the attack vectors.

[–] AlpacaChariot 2 points 11 months ago

Thanks, I find the names of Ubiquiti's product lines pretty confusing particularly as they are often used together.

I have an Edgerouter X, an Edgerouter PoE-5, two UAP-AC-LR ("Ubiquiti UniFi-AC-LR") access points, and one UAP-AC-MESH ("Ubiquiti UniFi-AC-MESH") access point.

The access points came with UniFi firmware, whereas the routers were running EdgeOS. I'm no longer using the PoE-5 and I've replaced the firmware on all of the other devices with OpenWrt.

[–] [email protected] 2 points 11 months ago

The articles refer to EdgeOS, not UniFi, which is a separate thing.

[–] agent_flounder 2 points 11 months ago

Indeed. Pretty sure the latter is blocked by default.