{"id":626,"date":"2018-10-31T18:21:59","date_gmt":"2018-10-31T16:21:59","guid":{"rendered":"https:\/\/blog.nav.ro\/?p=626"},"modified":"2019-02-19T13:06:46","modified_gmt":"2019-02-19T11:06:46","slug":"defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys","status":"publish","type":"post","link":"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/","title":{"rendered":"Defecte ce permit atacatorilor s\u0103 atace mai multe modele de routere Linksys"},"content":{"rendered":"<p>Zeci de modele de routere Linksys sunt vulnerabile la atacuri care ar putea extrage informa\u021bii confiden\u021biale din configura\u021biile acestora, f\u0103c\u00e2ndu-le s\u0103 nu mai r\u0103spund\u0103 \u0219i chiar s\u0103 le acapareze complet.<\/p>\n<p>Vulnerabilit\u0103\u021bile au fost descoperite de c\u0103tre consultantul de securitate senior Tao Sauvage de la IOActive \u0219i cercet\u0103torul de securitate independent Antide Petit, \u00een timp ce lucrau \u00eempreun\u0103 pentru a analiza routerul wireless Linksys EA3500 Smart Wi-Fi.<\/p>\n<p>Cei doi cercet\u0103tori au descoperit un total de 10 vulnerabilit\u0103\u021bi care afecteaz\u0103 nu numai modelul EA3500, ci \u0219i dou\u0103 modele de router diferite din seriile Smart Wi-Fi, WRT \u0219i Wireless-AC ale celor de la Linksys. Chiar dac\u0103 aceste dispozitive sunt comercializate ca produse de larg consum, nu este neobi\u0219nuit s\u0103 le g\u0103sim \u00een medii de afaceri mici \u0219i \u00een birouri.<\/p>\n<p>Vulnerabilit\u0103\u021bile variaz\u0103 de la severitate sc\u0103zut\u0103 la ridicat\u0103 \u0219i influen\u021beaz\u0103 \u00een mod direct peste 7000 de routere care au interfe\u021bele administrative bazate pe web expuse la Internet. Numeroase alte dispozitive sunt vulnerabile la atacurile lansate prin re\u021belele locale de pe computere, telefoane sau alte dispozitive compromise.<\/p>\n<p>Dou\u0103 vulnerabilit\u0103\u021bi permit atacatorilor la distan\u021b\u0103 neautoriza\u021bi s\u0103 foloseasc\u0103 un atac de tip DDoS pe routerele afectate, trimi\u021b\u00e2nd cereri special create pentru una dintre interfe\u021bele lor de programare a aplica\u021biilor (API). Acest lucru poate determina ca dispozitivele s\u0103 nu r\u0103spund\u0103 \u0219i s\u0103 \u00eempiedice accesul utilizatorilor la internet.<\/p>\n<p>Alte deficien\u021be \u00een interfe\u021bele web ale routerelor Linksys afectate permit atacatorilor s\u0103 ignore autentificarea \u0219i s\u0103 acceseze mai multe scripturi CGI care pot dezv\u0103lui informa\u021bii sensibile despre dispozitive \u0219i configura\u021biile lor. Informa\u021biile expuse includ codul Wi-Fi Protected Setup (WPS) care poate permite atacatorilor s\u0103 acceseze re\u021beaua f\u0103r\u0103 fir \u0219i s\u0103 atace un router afectat din interior.<\/p>\n<p>Aceste vulnerabilit\u0103\u021bi pot fi de asemenea folosite pentru a ob\u021bine versiunile de firmware \u0219i kernel ale routerului, o list\u0103 cu procesele \u00een execu\u021bie, informa\u021bii despre computerele conectate la routere, o list\u0103 de dispozitive USB \u0219i set\u0103rile de configurare pentru serverele de distribuire a fi\u0219ierelor FTP \u0219i SMB.<\/p>\n<p>\u00cen cele din urm\u0103, vulnerabilitatea cea mai grav\u0103 ar putea permite atacatorilor s\u0103 injecteze \u0219i s\u0103 execute comenzi shell cu privilegii de root pe routerele afectate. Acest lucru ar putea fi folosit pentru a configura un cont administrativ din backdoor care nu ar fi listat \u00een interfa\u021ba web.<\/p>\n<p>Spre deosebire de celelalte defecte, vulnerabilitatea de injectarea a comenzilor necesit\u0103 autentificare pentru a fi exploatat\u0103, ceea ce \u00eenseamn\u0103 c\u0103 atacatorii trebuie s\u0103 aib\u0103 acces la un cont existent. Din fericire, routerele Linksys au protec\u021bie \u00eempotriva atacurilor de tip &#8222;forgery&#8221; (CSRF) care, \u00een caz contrar, ar permite atacatorilor s\u0103 atace browser-ul administratorului de router \u0219i s\u0103-l redirecteze pe o sesiune activ\u0103 de conectare pentru a exploata aceast\u0103 vulnerabilitate.<\/p>\n<p>Singura modalitate de a exploata acest defect este dac\u0103 numele de utilizator \u0219i parola de conectare implicite nu au fost modificate, ceea ce din p\u0103cate este \u00eenc\u0103 o gre\u0219eal\u0103 comun\u0103 a securit\u0103\u021bii pe routere. Cei doi cercet\u0103tori au constatat c\u0103 11% din cele 7000 de routere Linksys expuse pe Internet pe care le-au identificat folosind motorul de c\u0103utare Shodan au folosit \u00een continuare acredit\u0103ri implicite.<\/p>\n<p>Raportul dintre dispozitivele care utilizeaz\u0103 parola implicit\u0103 \u0219i care nu sunt accesibile pe internet este probabil mult mai mare. Asta pentru c\u0103 oamenii sunt mai pu\u021bin con\u0219tien\u021bi de aceast\u0103 problem\u0103 dac\u0103 nu inten\u021bioneaz\u0103 s\u0103 permit\u0103 administrarea la distan\u021b\u0103 \u0219i nu \u00ee\u0219i dau seama c\u0103 routerele lor pot fi \u00eenc\u0103 atacate prin intermediul re\u021belei locale.<\/p>\n<p>\u00cen februarie, cercet\u0103torii \u00een domeniul securit\u0103\u021bii au descoperit un program trojan de Windows care \u00eencearc\u0103 s\u0103 acceseze routerele prin LAN utiliz\u00e2nd acredit\u0103ri standard implicite. Dac\u0103 reu\u0219e\u0219te, instaleaz\u0103 Mirai pe ele, un program malware care \u00eenrobe\u0219te dispozitivele \u00eencorporate \u0219i le folose\u0219te pentru a lansa atacuri DDoS.<\/p>\n<p>\u00cen decembrie, cercet\u0103torii de la Kaspersky Lab au descoperit o aplica\u021bie r\u0103u inten\u021bionat\u0103 pentru Android, care a fost, de asemenea, proiectat\u0103 s\u0103 intercepteze router-ele pe re\u021belele locale prin utilizarea acredit\u0103rilor implicite.<\/p>\n<p>Amenin\u021barea atacurilor locale este sporit\u0103, deoarece oamenii adesea l\u0103sau prieteni \u0219i membri ai familiei s\u0103 se conecteze la re\u021belele lor f\u0103r\u0103 fir cu dispozitive proprii, ceea ce ar putea fi o bre\u0219\u0103 de securitate.<\/p>\n<p>Linksys, o divizie a celor de la Belkin, lucreaz\u0103 la lansarea actualiz\u0103rilor de firmware pentru a remedia aceste vulnerabilit\u0103\u021bi. \u00centre timp, compania \u00eei sf\u0103tuie\u0219te pe utilizatori s\u0103 dezactiveze func\u021bia de guests Wi-Fi de pe routerele lor pentru a reduce probabilitatea unei activit\u0103\u021bi mali\u021bioase \u0219i s\u0103 schimbe parola de administrator.<\/p>\n<p>Referin\u021bele Linksys listeaz\u0103 toate modelele afectate \u0219i recomand\u0103 activarea func\u021biei de actualizare automat\u0103 pentru a primi pachetele de firmware atunci c\u00e2nd acestea sunt disponibile.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zeci de modele de routere Linksys sunt vulnerabile la atacuri care ar putea extrage informa\u021bii confiden\u021biale din configura\u021biile acestora, f\u0103c\u00e2ndu-le s\u0103 nu mai r\u0103spund\u0103 \u0219i chiar s\u0103 le acapareze complet. Vulnerabilit\u0103\u021bile au fost descoperite de c\u0103tre consultantul de securitate senior Tao Sauvage de la IOActive \u0219i cercet\u0103torul de securitate independent Antide Petit, \u00een timp ce<\/p>\n","protected":false},"author":1,"featured_media":1027,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[152],"tags":[],"class_list":["post-626","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-room"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Defecte ce permit atacatorilor s\u0103 atace mai multe modele de routere Linksys - NAV.RO Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defecte ce permit atacatorilor s\u0103 atace mai multe modele de routere Linksys - NAV.RO Blog\" \/>\n<meta property=\"og:description\" content=\"Zeci de modele de routere Linksys sunt vulnerabile la atacuri care ar putea extrage informa\u021bii confiden\u021biale din configura\u021biile acestora, f\u0103c\u00e2ndu-le s\u0103 nu mai r\u0103spund\u0103 \u0219i chiar s\u0103 le acapareze complet. Vulnerabilit\u0103\u021bile au fost descoperite de c\u0103tre consultantul de securitate senior Tao Sauvage de la IOActive \u0219i cercet\u0103torul de securitate independent Antide Petit, \u00een timp ce\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/\" \/>\n<meta property=\"og:site_name\" content=\"NAV.RO Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nav6718\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-31T16:21:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-02-19T11:06:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/defecte_linnksys.png\" \/>\n\t<meta property=\"og:image:width\" content=\"728\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"NAV.RO\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nav6718\" \/>\n<meta name=\"twitter:site\" content=\"@nav6718\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"NAV.RO\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/\"},\"author\":{\"name\":\"NAV.RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e\"},\"headline\":\"Defecte ce permit atacatorilor s\u0103 atace mai multe modele de routere Linksys\",\"datePublished\":\"2018-10-31T16:21:59+00:00\",\"dateModified\":\"2019-02-19T11:06:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/\"},\"wordCount\":828,\"publisher\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/defecte_linnksys.png\",\"articleSection\":[\"DATA ROOM\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/\",\"url\":\"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/\",\"name\":\"Defecte ce permit atacatorilor s\u0103 atace mai multe modele de routere Linksys - NAV.RO Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/defecte_linnksys.png\",\"datePublished\":\"2018-10-31T16:21:59+00:00\",\"dateModified\":\"2019-02-19T11:06:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/#primaryimage\",\"url\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/defecte_linnksys.png\",\"contentUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/defecte_linnksys.png\",\"width\":728,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Prima pagin\u0103\",\"item\":\"https:\/\/www.nav.ro\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Defecte ce permit atacatorilor s\u0103 atace mai multe modele de routere Linksys\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#website\",\"url\":\"https:\/\/www.nav.ro\/blog\/\",\"name\":\"NAV.RO Blog\",\"description\":\"Stiri IT\u2705 de actualitate si noutati din domeniul Hosting \u279c Gazduire Web \u279c Servere Dedicate \/ VPS \u279c DATA CENTER \u279c Domenii \u2b50 Actualizare zilnica de la expertii NAV.RO\",\"publisher\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nav.ro\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#organization\",\"name\":\"NAV Communications\",\"url\":\"https:\/\/www.nav.ro\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png\",\"contentUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png\",\"width\":1120,\"height\":800,\"caption\":\"NAV Communications\"},\"image\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/nav6718\",\"https:\/\/x.com\/nav6718\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e\",\"name\":\"NAV.RO\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g\",\"caption\":\"NAV.RO\"},\"sameAs\":[\"https:\/\/www.nav.ro\"],\"url\":\"https:\/\/www.nav.ro\/blog\/author\/useradmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Defecte ce permit atacatorilor s\u0103 atace mai multe modele de routere Linksys - NAV.RO Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/","og_locale":"ro_RO","og_type":"article","og_title":"Defecte ce permit atacatorilor s\u0103 atace mai multe modele de routere Linksys - NAV.RO Blog","og_description":"Zeci de modele de routere Linksys sunt vulnerabile la atacuri care ar putea extrage informa\u021bii confiden\u021biale din configura\u021biile acestora, f\u0103c\u00e2ndu-le s\u0103 nu mai r\u0103spund\u0103 \u0219i chiar s\u0103 le acapareze complet. Vulnerabilit\u0103\u021bile au fost descoperite de c\u0103tre consultantul de securitate senior Tao Sauvage de la IOActive \u0219i cercet\u0103torul de securitate independent Antide Petit, \u00een timp ce","og_url":"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/","og_site_name":"NAV.RO Blog","article_publisher":"https:\/\/www.facebook.com\/nav6718","article_published_time":"2018-10-31T16:21:59+00:00","article_modified_time":"2019-02-19T11:06:46+00:00","og_image":[{"width":728,"height":380,"url":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/defecte_linnksys.png","type":"image\/png"}],"author":"NAV.RO","twitter_card":"summary_large_image","twitter_creator":"@nav6718","twitter_site":"@nav6718","twitter_misc":{"Scris de":"NAV.RO","Timp estimat pentru citire":"4 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/#article","isPartOf":{"@id":"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/"},"author":{"name":"NAV.RO","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e"},"headline":"Defecte ce permit atacatorilor s\u0103 atace mai multe modele de routere Linksys","datePublished":"2018-10-31T16:21:59+00:00","dateModified":"2019-02-19T11:06:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/"},"wordCount":828,"publisher":{"@id":"https:\/\/www.nav.ro\/blog\/#organization"},"image":{"@id":"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/defecte_linnksys.png","articleSection":["DATA ROOM"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/","url":"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/","name":"Defecte ce permit atacatorilor s\u0103 atace mai multe modele de routere Linksys - NAV.RO Blog","isPartOf":{"@id":"https:\/\/www.nav.ro\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/#primaryimage"},"image":{"@id":"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/defecte_linnksys.png","datePublished":"2018-10-31T16:21:59+00:00","dateModified":"2019-02-19T11:06:46+00:00","breadcrumb":{"@id":"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/#primaryimage","url":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/defecte_linnksys.png","contentUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/01\/defecte_linnksys.png","width":728,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/www.nav.ro\/blog\/defecte-ce-permit-atacatorilor-sa-atace-mai-multe-modele-de-routere-linksys\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Prima pagin\u0103","item":"https:\/\/www.nav.ro\/blog\/"},{"@type":"ListItem","position":2,"name":"Defecte ce permit atacatorilor s\u0103 atace mai multe modele de routere Linksys"}]},{"@type":"WebSite","@id":"https:\/\/www.nav.ro\/blog\/#website","url":"https:\/\/www.nav.ro\/blog\/","name":"NAV.RO Blog","description":"Stiri IT\u2705 de actualitate si noutati din domeniul Hosting \u279c Gazduire Web \u279c Servere Dedicate \/ VPS \u279c DATA CENTER \u279c Domenii \u2b50 Actualizare zilnica de la expertii NAV.RO","publisher":{"@id":"https:\/\/www.nav.ro\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nav.ro\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/www.nav.ro\/blog\/#organization","name":"NAV Communications","url":"https:\/\/www.nav.ro\/blog\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png","contentUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png","width":1120,"height":800,"caption":"NAV Communications"},"image":{"@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/nav6718","https:\/\/x.com\/nav6718"]},{"@type":"Person","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e","name":"NAV.RO","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g","caption":"NAV.RO"},"sameAs":["https:\/\/www.nav.ro"],"url":"https:\/\/www.nav.ro\/blog\/author\/useradmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts\/626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/comments?post=626"}],"version-history":[{"count":1,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts\/626\/revisions"}],"predecessor-version":[{"id":1044,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts\/626\/revisions\/1044"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/media\/1027"}],"wp:attachment":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/media?parent=626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/categories?post=626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/tags?post=626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}