router_bugs Profile Banner
Endless Router Bugs Profile
Endless Router Bugs

@router_bugs

Followers
92
Following
37
Statuses
128

Expect better from your router. Sponsored by Supernetworks (https://t.co/esdXjZWwso)

Seattle, WA
Joined March 2024
Don't wanna be here? Send us removal request.
@router_bugs
Endless Router Bugs
5 days
More from @runZeroInc
0
0
0
@router_bugs
Endless Router Bugs
6 days
0
0
0
@router_bugs
Endless Router Bugs
12 days
0
0
0
@router_bugs
Endless Router Bugs
13 days
0
2
5
@router_bugs
Endless Router Bugs
14 days
Sonicwall preauth RCE CVE2025-23006 discovered in the wild by Microsoft Threat Intelligence Center (MSTIC) #RCE
0
0
1
@router_bugs
Endless Router Bugs
14 days
0
0
0
@router_bugs
Endless Router Bugs
1 month
RT @CISACyber: #Ivanti released security updates to address CVE-2025-0282—being actively exploited—and CVE-2025-0283, affecting Connect Sec…
0
129
0
@router_bugs
Endless Router Bugs
1 month
RCE in Ivanti exploited in the wild. Successful exploitation of CVE-2025-0282 could lead to unauthenticated remote code execution. CVE-2025-0283 could allow a local authenticated attacker to escalate privileges.
0
1
1
@router_bugs
Endless Router Bugs
1 month
Today, the Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned Integrity Technology Group, Incorporated (Integrity Tech), a Beijing-based cybersecurity company, for its role in multiple computer intrusion incidents against U.S. victims.
@USTreasury
Treasury Department
1 month
Today, @USTreasury’s Office of Foreign Assets Control sanctioned Integrity Technology Group, Inc., a Beijing-based cybersecurity company, for its role in multiple computer intrusion incidents against U.S. victims.
0
0
0
@router_bugs
Endless Router Bugs
2 months
0
0
0
@router_bugs
Endless Router Bugs
2 months
RT @_mccaulay: An interesting heap emulation technique to exploit the (not yet banned in the US) TP-Link Archer AX21 Router
0
37
0
@router_bugs
Endless Router Bugs
2 months
0
0
0
@router_bugs
Endless Router Bugs
2 months
RT @hyprdude: Netgear be like
0
1
0
@router_bugs
Endless Router Bugs
2 months
RT @RGB_Lights: US Government moving on China associated TP Link as another concern in our cyber supply chain. Growing to dominate the resi…
0
136
0
@router_bugs
Endless Router Bugs
2 months
RT @hackyboiz: [1day1line] CVE-2024-53375: TP-Link Remote Code Execution Vulnerability Remote code execution vulnerability with root privi…
0
14
0
@router_bugs
Endless Router Bugs
3 months
RT @Volexity: .@Volexity’s latest blog post describes in detail how a Russian APT used a new attack technique, the “Nearest Neighbor Attack…
0
182
0
@router_bugs
Endless Router Bugs
3 months
RT @_r_netsec: Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575 - watchTowr Labs
0
2
0
@router_bugs
Endless Router Bugs
3 months
Cisco CVSS 10 RCE: CVE-2024-20418 with products using wireless backhaul Affects Catalyst IW9165D Access Points, Catalyst IW9165E Rugged Access Points and Wireless Clients, and Catalyst IW9167E Access Points in URWB mode
0
0
3
@router_bugs
Endless Router Bugs
3 months
CVE-20224-5209 CVE-2024-47460 Unauthenticated RCE in Aruba Access Points Specially crafted packets destined to the PAPI (Aruba’s Access Point management protocol) UDP port (8211), lead to privileged Remote Code Execution (RCE).
2
3
11
@router_bugs
Endless Router Bugs
3 months
RT @xnyhps: 👀👀
0
2
0