Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore critical security vulnerabilities in modern 4G and 5G routers through this 27-minute DEF CON 33 conference talk that demonstrates how seemingly advanced networking hardware can harbor dangerous security flaws. Examine real-world security oversights found in routers used across small businesses, industrial IoT deployments, and mobile networks, where researchers discovered vulnerabilities reminiscent of older security issues including weak default credentials, inadequate authentication mechanisms, and command injection pathways. Learn how reverse-engineering firmware and testing insecure endpoints can reveal serious exploits affecting Tuoshi and KuWFi devices, enabling remote code execution, arbitrary SMS transmission, and network compromise. Follow practical demonstrations using Burp Suite requests and Ghidra disassembly to understand how these weaknesses grant attackers root access, enable fraudulent activities, and compromise entire network infrastructures. Discover essential mitigation strategies and security best practices including robust authentication implementation, regular firmware updates, and proper network segmentation to protect against these vulnerabilities. Gain insights into the critical importance of continuous security scrutiny for modern hardware and understand how the security community can collaborate to identify and address pervasive vulnerabilities in contemporary networking equipment.