Exposed by Default: A Security Analysis of Home Router Default Settings and Beyond

Junjian Ye, Xavier De Carne De Carnavalet, Lianying Zhao, Mengyuan Zhang, Lifa Wu*, Wei Zhang

*Corresponding author for this work

Research output: Contribution to JournalArticleAcademicpeer-review

490 Downloads (Pure)

Abstract

With the popularity of the Internet, home routers have become crucial for the security of home networks. However, according to the results of our user survey, home routers are often deployed with minimal changes to the factory default settings, which may pose risks to user security and privacy. To systematically evaluate potential risks, we designed a threat-model-based framework and conducted a comprehensive analysis of 40 commercial off-the-shelf home routers from 14 brands. We found a variety of security issues, among which incorrect implementation of TLS is the most common. To improve the efficiency of manually detecting TLS certificate validation vulnerabilities without real routers, we proposed a heuristic method that can narrow down the search scope in firmware and proved its effectiveness with 30 available firmware images of the routers we purchased. Moreover, we evaluated the security of custom remote management protocols and found several cryptographic misuses. Finally, we proposed several recommendations for extending the analysis framework and discussed our ideas about automatically detecting security issues to highlight the need for heightened scrutiny of default settings and inspire other researchers.

Original languageEnglish
Pages (from-to)1182-1199
Number of pages18
JournalIEEE Internet of Things Journal
Volume12
Issue number2
Early online date19 Nov 2024
DOIs
Publication statusPublished - 15 Jan 2025

Bibliographical note

Publisher Copyright:
© 2014 IEEE.

Keywords

  • Default settings
  • home router security
  • manual analysis
  • TLS misconfiguration

Fingerprint

Dive into the research topics of 'Exposed by Default: A Security Analysis of Home Router Default Settings and Beyond'. Together they form a unique fingerprint.

Cite this