Reading an article, I discovered that there is a router vulnerability that put approx. 12 million home network users at risk for theft of personal information, home security, and even control of devices on the network. This vulnerability resides in the firmware of the wireless router, typically in the web server "ROMpager".The HTTP server provides the web-based user-friendly interface for configuring the products.
This vulnerability effects versions prior to 4.34 and makes them susceptible to a bug called the "Misfortune cookie". It is called this because it allows attackers to control the HTTP request by manipulating cookies. The vulnerability, tracked as CVE-2014-9222 in the Common Vulnerabilities and Exposures database, can be exploited by sending a single specifically crafted request to the affected RomPager server that would corrupt the gateway device's memory. This allows an attacker to target any device connected to the network.
This is critical because once the attacker gains control of the network they can monitor webcams, read text messages, steal data, or control any platform connected(including home security devices).At least 200 different models of gateway devices, or small office/home office (SOHO) routers from various manufacturers and brands are vulnerable to Misfortune Cookie, including kit from D-Link, Edimax, Huawei, TP-Link, ZTE, and ZyXEL.
Ideally, if you own one of these routers, it is probably best to upgrade your home network security protocols by either updating the firmware or changing the router out for a newer system. Although this vulnerability was first exposed in 2002, over 12 million home networks still exist with this vulnerability. Here why- some vendor firmware patches that have been installed to correct this vulnerability, just removed the version number on the firmware, making it appear to have fixed the issue when in reality it did not.
To learn more read at: http://thehackernews.com/2014/12/router-vulnerability-puts-12-million.html#sthash.SPN8gPqa.dpuf