- Joined
- Jan 5, 2006
- Messages
- 17,794 (2.66/day)
System Name | AlderLake / Laptop |
---|---|
Processor | Intel i7 12700K P-Cores @ 5Ghz / Intel i3 7100U |
Motherboard | Gigabyte Z690 Aorus Master / HP 83A3 (U3E1) |
Cooling | Noctua NH-U12A 2 fans + Thermal Grizzly Kryonaut Extreme + 5 case fans / Fan |
Memory | 32GB DDR5 Corsair Dominator Platinum RGB 6000MHz CL36 / 8GB DDR4 HyperX CL13 |
Video Card(s) | MSI RTX 2070 Super Gaming X Trio / Intel HD620 |
Storage | Samsung 980 Pro 1TB + 970 Evo 500GB + 850 Pro 512GB + 860 Evo 1TB x2 / Samsung 256GB M.2 SSD |
Display(s) | 23.8" Dell S2417DG 165Hz G-Sync 1440p / 14" 1080p IPS Glossy |
Case | Be quiet! Silent Base 600 - Window / HP Pavilion |
Audio Device(s) | Panasonic SA-PMX94 / Realtek onboard + B&O speaker system / Harman Kardon Go + Play / Logitech G533 |
Power Supply | Seasonic Focus Plus Gold 750W / Powerbrick |
Mouse | Logitech MX Anywhere 2 Laser wireless / Logitech M330 wireless |
Keyboard | RAPOO E9270P Black 5GHz wireless / HP backlit |
Software | Windows 11 / Windows 10 |
Benchmark Scores | Cinebench R23 (Single Core) 1936 @ stock Cinebench R23 (Multi Core) 23006 @ stock |
"Anyone can exploit the flaw after the exploit code was published."
"Two leading Netgear routers are vulnerable to a severe security flaw.
An advisory posted on Friday in Carnegie Mellon University's public vulnerability database (CERT) said that Netgear's R7000 and R6400 routers, running current and recent firmware respectively, are vulnerable to an arbitrary command injection flaw.
If exploited, the vulnerability could let an unauthenticated attacker run commands with root privileges.
The code to exploit the vulnerability -- effectively just a URL -- has been released publicly, allowing anyone to carry out attacks.
An attacker would have to trick a user into visiting a website that contains the code, such as an invisible web frame, to exploit the flaw. Adding commands to the router's IP address can open up ports on the router, such as Telnet.
The advisory said that other router models may be vulnerable.
CERT advised users to "strongly consider discontinuing use" of the devices until a fix is made available.
It's not clear how many users are affected by the flaw. A Netgear spokesperson did not respond to a request for comment at the time of writing.
Router flaws are increasingly being exploited by attackers, who use vulnerabilities to launch large-scale distributed denial-of-service (DDoS) attacks to flood and overload networks with traffic."
http://www.zdnet.com/article/two-netgear-routers-are-vulnerable-to-trivial-to-remote-hack/
"Two leading Netgear routers are vulnerable to a severe security flaw.
An advisory posted on Friday in Carnegie Mellon University's public vulnerability database (CERT) said that Netgear's R7000 and R6400 routers, running current and recent firmware respectively, are vulnerable to an arbitrary command injection flaw.
If exploited, the vulnerability could let an unauthenticated attacker run commands with root privileges.
The code to exploit the vulnerability -- effectively just a URL -- has been released publicly, allowing anyone to carry out attacks.
An attacker would have to trick a user into visiting a website that contains the code, such as an invisible web frame, to exploit the flaw. Adding commands to the router's IP address can open up ports on the router, such as Telnet.
The advisory said that other router models may be vulnerable.
CERT advised users to "strongly consider discontinuing use" of the devices until a fix is made available.
It's not clear how many users are affected by the flaw. A Netgear spokesperson did not respond to a request for comment at the time of writing.
Router flaws are increasingly being exploited by attackers, who use vulnerabilities to launch large-scale distributed denial-of-service (DDoS) attacks to flood and overload networks with traffic."
http://www.zdnet.com/article/two-netgear-routers-are-vulnerable-to-trivial-to-remote-hack/