this post was submitted on 05 Sep 2025
61 points (100.0% liked)

Cybersecurity

8267 readers
12 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
top 7 comments
sorted by: hot top controversial new old
[–] jewbacca117@lemmy.world 19 points 2 days ago (1 children)

In addition to the back doors?

[–] ImgurRefugee114@reddthat.com 5 points 2 days ago

A new vulnerability in a TP-Link device? Oh no, it must be a day ending in Y

[–] witty_username@feddit.nl 7 points 2 days ago

"[It] affects several popular models, including the Archer AX10 and AX1500.

[...] input from external messages is used directly to calculate a buffer length [...] without any boundary checks. [...] A payload of 4096 bytes [...] confirmed that the program counter can be overwritten. This means that complete system compromise with root privileges is achievable."

Sounds very fixable

[–] wizardbeard@lemmy.dbzer0.com 8 points 2 days ago

Glad I only have two of their "dumb" switches then.

[–] sunzu2@thebrainbin.org 5 points 2 days ago

Proprietary software

[–] treadful@lemmy.zip 1 points 2 days ago

This happens every week, it seems.