- Joined
- Jan 5, 2006
- Messages
- 18,584 (2.63/day)
System Name | AlderLake |
---|---|
Processor | Intel i7 12700K P-Cores @ 5Ghz |
Motherboard | Gigabyte Z690 Aorus Master |
Cooling | Noctua NH-U12A 2 fans + Thermal Grizzly Kryonaut Extreme + 5 case fans |
Memory | 32GB DDR5 Corsair Dominator Platinum RGB 6000MT/s CL36 |
Video Card(s) | MSI RTX 2070 Super Gaming X Trio |
Storage | Samsung 980 Pro 1TB + 970 Evo 500GB + 850 Pro 512GB + 860 Evo 1TB x2 |
Display(s) | 23.8" Dell S2417DG 165Hz G-Sync 1440p |
Case | Be quiet! Silent Base 600 - Window |
Audio Device(s) | Panasonic SA-PMX94 / Realtek onboard + B&O speaker system / Harman Kardon Go + Play / Logitech G533 |
Power Supply | Seasonic Focus Plus Gold 750W |
Mouse | Logitech MX Anywhere 2 Laser wireless |
Keyboard | RAPOO E9270P Black 5GHz wireless |
Software | Windows 11 |
Benchmark Scores | Cinebench R23 (Single Core) 1936 @ stock Cinebench R23 (Multi Core) 23006 @ stock |
Testaankoop: Some Linksys routers send login credentials to US based server in plaintext
According to the Belgian consumer organization Testaankoop, the Velop Pro WiFi 6E and 7 mesh routers from the Linksys brand have been experiencing security problems for more than six months.
The routers would send plaintext login credentials to a server in the US during installation.
According to Testaankoop, this concerns the Linksys Velop Pro WiFi 6E, the MX6201-KE and MX6203-KE versions, and the Linksys Velop Pro 7.
According to the consumer organization, both mesh router systems send 'the configured SSID name and password' in plaintext during the installation process. to an Amazon server in the US.
They would also send identification tokens and a user session access token, which would enable a man-in-the-middle attack. In such an attack, the connection between the router and a server is intercepted, which could result in data being stolen.
Testaankoop claims to have informed Linksys about the vulnerability several times: for the first time in November 2023 and recently after the release of a firmware update.
Despite the reports, the problem is not solved, even after the firmware update.
tweakers.net
According to the Belgian consumer organization Testaankoop, the Velop Pro WiFi 6E and 7 mesh routers from the Linksys brand have been experiencing security problems for more than six months.
The routers would send plaintext login credentials to a server in the US during installation.
According to Testaankoop, this concerns the Linksys Velop Pro WiFi 6E, the MX6201-KE and MX6203-KE versions, and the Linksys Velop Pro 7.
According to the consumer organization, both mesh router systems send 'the configured SSID name and password' in plaintext during the installation process. to an Amazon server in the US.
They would also send identification tokens and a user session access token, which would enable a man-in-the-middle attack. In such an attack, the connection between the router and a server is intercepted, which could result in data being stolen.
Testaankoop claims to have informed Linksys about the vulnerability several times: for the first time in November 2023 and recently after the release of a firmware update.
Despite the reports, the problem is not solved, even after the firmware update.

Testaankoop: Linksys-routers sturen inloggegevens naar VS in plaintext - update
De Velop Pro WiFi 6E- en 7-meshrouters van het merk Linksys ondervinden volgens de Belgische consumentenorganisatie Testaankoop al meer dan een halfjaar beveiligingsproblemen. De routers zouden tijdens de installatie in plaintext inloggegevens naar een server in de VS sturen.
Last edited: