This task addresses a system that automatically searches for and patches vulnerable (hacked) home routers. Today, millions of home routers around the world are using old versions of firmware, in which a huge number of vulnerabilities has already been detected. This makes them easy prey for attackers. We often see how these boxes are used as proxy-devices (including in targeted attacks), or their settings (most often DNS) are changed to redirect users to phishing sites. Updating these devices would solve the problem, but for a large number of users this task is too time-consuming. You are invited to offer a solution to the problem of updating devices and changing simple passwords on home routers.
The main problems related to the security of home routers are: login and password combinations that are easy to guess, default passwords for administrator accounts, outdated firmware that has not been updated by users and which contain vulnerabilities. Any of these risks could result in the device being compromised, meaning it could then be used by the attackers at their own discretion.
At the proof-of-concept (PoC) level the program based on this research should be able to:
The system should be implemented for the routers of one of the following manufacturers: ASUS, TP-Link, Netgear, Linksys, D-link, Ubiquiti, Cisco, Zyxel
You should also provide a description of the proposed method for solving the problem.
https://www.shodan.io/ — to check how many such devices are online
https://www.virusbulletin.com/virusbulletin/2015/02/paper-p0wned-barcode-stealing-money-offline-users/ — example of how criminals use these vulnerabilities in routers
To evaluate the efficiency of the PoC, a series of tests on infected routers will be performed.