A major vulnerability in the Belkin n750 router could allow hackers to activate the guest network functionality and join your network without any authentication requirements.
How to fix the vulnerability
Fortnuately, Belkin has already patched the issue so the only thing you need to do to solve the problem if you own a Belkin n750 is update the firmware.
You can read the technical details of the exploit written by Marco Vaz of Integrity Labs here.
A vulnerability in the guest network web interface of the Belkin N750 DB Wi-Fi Dual-Band N+ Gigabit Router with firmware F9K1103_WW_1.10.16m, allows an unauthenticated remote attacker to gain root access to the operating system of the affected device. The guest network functionality is default functionality and is delivered over an unprotected wifi network.
The Belkin router is very popular for residential use, but it is possible that your clients (especially clients that have franchise locations) could be using it too. At a minimum this vulnerability serves as a valuable lesson to everyone. When you talk about patches and updates you should be including router firmware.
For the home user, you can further secure your network by :
- Changing the default user name and password used to log into the Router management interface (reached by typing your Gateway into a browser (i.e. 192.168.1.1))
- Verifying you aren’t using WEP encryption if using older routers.
- Avoid sharing files with the “Everyone” group and set up your home network to use encryption and disabling sharing within your operating system settings.
Note: Most patches and releases should follow a defined change management process.