Get online support
I have an Archer VR1600v (v1 00000000)
The current firmware release on my modem is: 0.1.0 0.9.1 v5006.0 Build 180828 Rel.56416n
An update is required, please send me details on how to update the firmware on this device.
Thank you in advance.
Hi @rjlevy,
Welcome to TPG Community!
Good news! Your modem already has the latest firmware.
Let us know should you require further assistance.
Kind regards,
BasilDV
A firmware update is definitely required! There is a vulnerability to Port 7547 which allows the device to be hijacked for DDoS attacks - I can port scan my modem from my mobile or a web utility and it shows that this port is already OPEN! (of course I have not opened it).
See this article:
https://securityintelligence.com/mirai-evolving-new-attack-reveals-use-of-port-7547/
I was told by TPG tech that I would have to chase this issue up with Archer - which I will do but I am registering my concern here so others will know about the problem.
Phil.
**
Just got this service installed yesterday
And I read this--
Surely you can't keep supplying Modems with a "KNOWN" security flaw
admittedly it isnt your modem - "But it is your customised firmware"
Wouldnt this make you guys kinda Libel...
Please confirm this is of major importance to you guys
and release a time table for a simple firmware fix
Really concerned
Welcome to TPG Community @Strider!
Regarding with your concern, we work closely with our hardware vendors to ensure product security. An open port does not mean it is a security flaw. There is no known vulnerability at this time on the VR1600v that allows remote code execution via port 7547.
well why is this port open on this modem?
Meanwhile get the modem firmware updated (Always best to have latest)
-Not sure why we have to ask - as the door as we see is open for auto - updating-
I do not think the issue is that the port is open, the question is "Why is TPG allowing it to be accessible by external networks?". What possible reason could someone external to TPG have to access that port?
TPG, please see https://www.computerworld.com/article/3145003/blame-the-isps-rather-than-the-routers.html
and
https://securityintelligence.com/mirai-evolving-new-attack-reveals-use-of-port-7547/