{"id":51645,"date":"2023-04-27T01:19:00","date_gmt":"2023-04-27T01:19:00","guid":{"rendered":"https:\/\/www.networkworld.com\/article\/3694848\/your-decommissioned-routers-could-be-a-security-disaster.html#tk.rss_security"},"modified":"2023-04-27T01:19:00","modified_gmt":"2023-04-27T01:19:00","slug":"your-decommissioned-routers-could-be-a-security-disaster","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/","title":{"rendered":"Your decommissioned routers could be a security disaster"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/03\/sitting_duck_easy_target_easy_pickings_targeting_victim_by_vasif_bagirov_gettyimages-1205995115_hack_crime_criminal_by_thinkstock_2400x1600-100836275-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>Here&#8217;s bad news: It&#8217;s easy to buy used enterprise routers that haven\u2019t been decommissioned properly and that still contain data about the organizations they were once connected to, including IPsec credentials, application lists, and cryptographic keys.<\/p>\n<p>\u201cThis leaves critical and sensitive configuration data from the original owner or operator<br \/>accessible to the purchaser and open to abuse,\u201d according to a white paper by Cameron Camp, security researcher, and Tony Anscombe, chief security evangelist, for security firm Eset (See: <a href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2023\/04\/used_routers_corporate_secrets.pdf\" rel=\"nofollow\">Discarded, not destroyed: Old routers reveal corporate secrets<\/a>).<\/p>\n<p>The pair bought 18 used routers and from them gleaned administrator passwords, maps of specific applications, data that would allow third-party access to other companies&#8217; networks, and enough information to identify the enterprises that once used them.<\/p>\n<p>Often, they included network locations and some revealed cloud applications hosted in specific remote<a href=\"https:\/\/www.networkworld.com\/article\/3599213\/what-are-data-centers-how-they-work-and-how-they-are-changing-in-size-and-scope.html\"> data centers<\/a>, \u201ccomplete with which ports or controlled-access mechanisms were used to access them, and from which source networks.\u201d Additionally, they found firewall rules used to block or allow certain access from certain networks. Often specifics about the times of day they could be accessed were available as well.<\/p>\n<p>\u201cWith this level of detail, impersonating network or internal hosts would be far simpler for an attacker, especially since the devices often contain <a href=\"https:\/\/www.networkworld.com\/article\/3268744\/understanding-virtual-private-networks-and-why-vpns-are-important-to-sd-wan.html\">VPN<\/a> credentials or other easily cracked authentication tokens,\u201d according to the white paper.<\/p>\n<p>The <a href=\"https:\/\/www.networkworld.com\/article\/2258436\/what-is-a-network-router.html\">routers<\/a>\u2014four Cisco ASA 5500 Series, three Fortinet Fortigate Series, and 11 Juniper Networks SRX Series Service Gateways\u2014were all bought legally through used-equipment vendors, according to the paper. \u201cNo procedures or tools of a primarily forensic or data-recovery nature were ever employed, nor were any techniques that required opening the routers\u2019 cases,\u201d yet the researchers said they were able to recover data that would be \u201ca treasure trove for a potential adversary\u2014for both technical and social-engineering attacks.\u201d<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>Of the 18 routers, one of them was dead\u2014only the fan worked\u2014so it was dropped from the testing, and two were paired for failover, so one of them was also dropped. Two others were hardened, so yielded only internal and external IP addresses. Five had apparently been cleaned of configuration data in accordance with device-specific wiping procedures, so any data they might have contained wasn\u2019t \u201ctrivially extractable,\u201d the researchers wrote.<\/p>\n<p>That left nine with complete configuration data available that \u201callowed us to<br \/>ascertain with very high confidence the previous owners of those routers,\u201d Camp and Anscombe wrote. The white paper doesn\u2019t reveal the organizations\u2019 names but describes them as \u201ca data-center\/cloud computing business (specifically, a router provisioning a university\u2019s virtualized assets), a nationwide US law firm, manufacturing and tech companies, a creative firm, and a major Silicon Valley-based software developer.\u201d<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>More than one router had been installed in a corporate network by managed IT providers then removed and resold with the data still on them, \u201cso, often the affected organizations would have no idea that they may now be vulnerable to attacks due to data leaks by some third party.\u201d<\/p>\n<p>The one-time owners of the devices who were contacted by the researchers were unhappy about this. \u201cSome were further surprised to learn that their former device was still in existence, having paid to have it shredded,\u201d they wrote.<\/p>\n<p>A medium-sized manufacturing business that used a disposal service was shocked by the data still on their retired router, the researchers wrote: \u201cThis data revealed company specifics like where their data centers are (complete with IPs) and what kinds of processes happened at those locations. From this information an adversary could get a critical view into proprietary processes that could be invaluable to the company\u2014their secret sauce\u2014which could be quite damaging. In an era where potential competitors digitally steal technical research, product designs, and other intellectual property to shortcut engineering R&amp;D processes, this could have had a real financial impact.\u201d<\/p>\n<p>The problem isn\u2019t the fault of the router vendors. \u201cSome devices had better default security settings that made some data harder to access, but all devices had settable options to guard against the proliferation of \u2018residual data\u2019, even if they weren\u2019t implemented,\u201d the white paper said, \u201csettings that would have been free and fairly simple to implement had the previous owners or operators known\u2014or cared\u2014to enable them.\u201d<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>Based on the level of security implemented on the devices, Camp and Anscombe made inferences about the general security posture of each enterprise. \u201cBy noting how detailed or vague their security defenses were on these devices, we could make a reasonable approximation about the security levels in the rest of their environment,\u201d the researchers wrote.<\/p>\n<p>They noted that the size and sophistication of the organizations didn\u2019t indicate their security expertise. \u201cWe would expect to see a large, multinational organization have a very structured, standards-driven, and complete set of security initiatives reflected in their devices\u2019 configurations, but that just wasn\u2019t always the case,\u201d they wrote.<\/p>\n<h2>IoT networks are at risk<\/h2>\n<p>The problem of improper decommissioning is broader. \u201cIt\u2019s not just routers,\u201d they wrote, \u201call kinds of hard drives and removable media in the secondary market have already been investigated and found to be positively oozing the previous owners\u2019 most sensitive data, and there promises to be a proliferation of stored data on<a href=\"https:\/\/www.networkworld.com\/article\/3207535\/what-is-iot-the-internet-of-things-explained.html\"> IoT<\/a> devices throughout the corporate environment. If miscreants manage to exploit one of a family of IoT devices, it seems likely that they would be able to gather corporate secrets on the secondary market for a whole class of devices, and then sell that data to the highest bidder or do the exploiting themselves.\u201d<\/p>\n<p>Camp and Anscombe originally set out to create a lab to test networks against real-world attacks and bought used gear for $50 to $100 to approximate current production environments. As the equipment arrived, they realized the devices, particularly core routers, contained sensitive information. \u201cTo determine if this initial finding was a one-off, we began procuring more device variations, as used in different market segments,\u201d they wrote.<\/p>\n<aside class=\"nativo-promo nativo-promo-3 tablet desktop smartphone\" id> <\/aside>\n<h2>How to dispose of routers more safely<\/h2>\n<p>The researchers pointed out areas where enterprises should exercise caution to avoid having used routers leak data to whoever buys them.<\/p>\n<p>First off, they recommend cleaning the devices using wiping instructions created by the vendors. \u201cThe irony is that these devices are typically fairly simple to wipe, often with just a command or two,\u201d Camp and Anscombe wrote. \u201cSome units, however, store historic configurations that may still be accessible, so you should carefully verify that there really is none of your information left on any of these devices.\u201d<\/p>\n<p>That might be accomplished on some devices by removing internal hard drives, CompactFlash, or other removable media and analyzing them with forensic tools to reveal whether sensitive data remained accessible.<\/p>\n<p>Then beware when third parties may be in the security chain. An enterprise might hire a trusted managed service provider with a good reputation, but that provider might hire other vendors of unknown reliability to install and maintain devices and, importantly, retire them. \u201cThe lesson here might be that even if you\u2019re doing your best work, relying on third parties to perform as expected is a process that is far from perfect\u201d the research said.<\/p>\n<p>\u201cOn many levels, this research is about human error compounding to create a potential breach and the mitigation steps companies can take to reduce or avoid such pitfalls moving forward.\u201d<\/p>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">\n<p> <strong>Next read this:<\/strong> <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3694848\/your-decommissioned-routers-could-be-a-security-disaster.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nHere&#8217;s bad news: It&#8217;s easy to buy used enterprise routers that haven\u2019t been decommissioned properly and that still contain data about the organizations they were once connected to, including IPsec credentials, application lists, and cryptographic keys.\u201cThis leaves critical and sensitive configuration data from the original owner or operatoraccessible to the purchaser and open to abuse,\u201d according to a white paper by Cameron Camp, security researcher, and Tony Anscombe, chief security evangelist, for security firm Eset (See: Discarded, not destroyed: Old routers reveal corporate secrets).To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51646,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[692,307],"class_list":["post-51645","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-router","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Your decommissioned routers could be a security disaster 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your decommissioned routers could be a security disaster 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-27T01:19:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/article\/2020\/03\/sitting_duck_easy_target_easy_pickings_targeting_victim_by_vasif_bagirov_gettyimages-1205995115_hack_crime_criminal_by_thinkstock_2400x1600-100836275-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-decommissioned-routers-could-be-a-security-disaster\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-decommissioned-routers-could-be-a-security-disaster\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Your decommissioned routers could be a security disaster\",\"datePublished\":\"2023-04-27T01:19:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-decommissioned-routers-could-be-a-security-disaster\\\/\"},\"wordCount\":1235,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-decommissioned-routers-could-be-a-security-disaster\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/your-decommissioned-routers-could-be-a-security-disaster.jpg\",\"keywords\":[\"router\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-decommissioned-routers-could-be-a-security-disaster\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-decommissioned-routers-could-be-a-security-disaster\\\/\",\"name\":\"Your decommissioned routers could be a security disaster 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-decommissioned-routers-could-be-a-security-disaster\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-decommissioned-routers-could-be-a-security-disaster\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/your-decommissioned-routers-could-be-a-security-disaster.jpg\",\"datePublished\":\"2023-04-27T01:19:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-decommissioned-routers-could-be-a-security-disaster\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-decommissioned-routers-could-be-a-security-disaster\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-decommissioned-routers-could-be-a-security-disaster\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/your-decommissioned-routers-could-be-a-security-disaster.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/your-decommissioned-routers-could-be-a-security-disaster.jpg\",\"width\":150,\"height\":100},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-decommissioned-routers-could-be-a-security-disaster\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"router\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/router\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Your decommissioned routers could be a security disaster\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your decommissioned routers could be a security disaster 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/","og_locale":"en_US","og_type":"article","og_title":"Your decommissioned routers could be a security disaster 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-04-27T01:19:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/article\/2020\/03\/sitting_duck_easy_target_easy_pickings_targeting_victim_by_vasif_bagirov_gettyimages-1205995115_hack_crime_criminal_by_thinkstock_2400x1600-100836275-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Your decommissioned routers could be a security disaster","datePublished":"2023-04-27T01:19:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/"},"wordCount":1235,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/your-decommissioned-routers-could-be-a-security-disaster.jpg","keywords":["router","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/","url":"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/","name":"Your decommissioned routers could be a security disaster 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/your-decommissioned-routers-could-be-a-security-disaster.jpg","datePublished":"2023-04-27T01:19:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/your-decommissioned-routers-could-be-a-security-disaster.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/your-decommissioned-routers-could-be-a-security-disaster.jpg","width":150,"height":100},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/your-decommissioned-routers-could-be-a-security-disaster\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"router","item":"https:\/\/www.threatshub.org\/blog\/tag\/router\/"},{"@type":"ListItem","position":3,"name":"Your decommissioned routers could be a security disaster"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51645"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51645\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51646"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}