Vulnerable computer systems and applications:
Routers, network hard drives.
The UPnP protocol is commonly used on the home network to exchange data and for devices to communicate with each other. The UPnP 1.0 protocol creates a security vulnerability, which could be used by malicious parties to take over devices and remotely control them. Infected devices could be used to transfer files, execute DoS attacks, intercept information sent on the network, etc.
- Update firmware;
- Set up the device in a way that prevents unwanted devices from using UPnP protocol service.