List Of Routers Potentially Vulnerable To Cherry Blossom

Cherry Blossom is the CIA exploit exposed by Wikileaks that is described as allowing for remote monitoring and manipulation of traffic passing through the router. A number of places have published a list of the routers listed as being potentially vulnerable, though much of the listed devices have not been confirmed as actually having firmware available that could be used to exploit them.

Quartz list of targeted devices

It is not clear if current firmware upgrades for various routers can successfully prevent them from being exploited. Protecting routers can be more difficult than protecting cameras, as the routers are directly connected and do not have any filtering device in front of them (typically).

Login to read this IPVM discussion.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

***** ** "**** ****", ***** ***** ** ***** ** *** list....

********* ******, *** ***** ***** *** ******* ******* **** *** USA **** ****** *** *** **** ***** **** *** ****** to *** *****.