{"id":54516,"date":"2023-11-14T19:14:00","date_gmt":"2023-11-14T19:14:00","guid":{"rendered":"https:\/\/www.darkreading.com\/vulnerabilities-threats\/21-vulnerabilities-discovered-crucial-it-ot-connective-routers"},"modified":"2023-11-14T19:14:00","modified_gmt":"2023-11-14T19:14:00","slug":"21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/","title":{"rendered":"21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt22304de8cf7c0214\/6553948a996a61040a5e28a2\/Industrial_plant-Kevin_Brine-Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Researchers have discovered 21 vulnerabilities in a popular brand of industrial router.<\/p>\n<p><a href=\"https:\/\/www.blackhat.com\/eu-23\/briefings\/schedule\/#old-code-dies-hard-finding-new-vulnerabilities-in-old-third-party-software-components-and-the-importance-of-having-sbom-for-iotot-devices-35349\" target=\"_blank\" rel=\"noopener\">On Dec. 7 at Black Hat Europe<\/a>, analysts from Forescout will reveal the bugs \u2014 including one of 9.6 &#8220;Critical&#8221; severity on the CVSS scale, and nine &#8220;High&#8221; severity \u2014 affecting a brand of operational technology (OT)\/Internet of Things (IoT) routers especially common in the medical and manufacturing sectors.<\/p>\n<p>OT\/IoT routers bridge the wider Internet with internal networks, via 3G and 4G cellular networks. They&#8217;re most often found in critical sectors such as transportation, government, and water treatment. Compromising these devices can enable lateral movement within networks, malware deployment, espionage, disruption of services, and much more.<\/p>\n<h2 class=\"regular-text\">Vulnerabilities Show Breadth and Depth<\/h2>\n<p>Seven of the newly discovered vulnerabilities lie in internal components of the routers. Fourteen of them derive from open source components, specifically, a captive portal for Wi-Fi networks and an XML processing library.<\/p>\n<p>The nature of the vulnerabilities run the gamut: cross-site scripting (XSS), denial of service (DoS), remote code execution (RCE), unauthorized access, and authentication bypass.<\/p>\n<p>Viewed another way, these bugs can be grouped into two broad categories. &#8220;It&#8217;s either a design flaw \u2014 things like hardcoded credentials, SSL certificates, and so on \u2014 or how the device handles potentially malicious or malformed inputs that could lead to injecting malicious code or to crashing the device,&#8221; explains <span>Daniel dos Santos, head of security research at Forescout<\/span>.<\/p>\n<p>With an opening into one of these devices, attackers can circumvent traditional industrial security protections and charge straight at the most critical devices in a plant.<\/p>\n<p>&#8220;When we talk about attacks in OT, the typical path is that somebody would find an initial access point on the IT network \u2014 a workstation of an employee that clicks on a phishing link,&#8221; <span>dos Santos says.<\/span> &#8220;Then there&#8217;s lateral movement, until something that bridges the gap with OT \u2014 an engineering workstation, data historian, SCADA system, or something like that \u2014 and then you manage to get access to IoT devices.&#8221; <\/p>\n<p>The interesting thing with these routers is that they tend to be bridging potentially critical devices with the Internet directly. &#8220;For pipelines or substations or things like that, you can imagine that they would be connected directly to potentially safety critical devices without requiring the typical IT-OT lateral movement,&#8221; dos Santos says.<\/p>\n<h2 class=\"regular-text\">86,000 Vulnerable Instances<\/h2>\n<p>The road to edge security may <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/where-sboms-stand-today\" target=\"_blank\" rel=\"noopener\">begin with SBOMs<\/a>, but there are even simpler, quicker fixes available to OT infrastructure providers right now.<\/p>\n<p>Using only regular scans, the researchers identified over 86,000 such OT\/IoT devices unprotected on the open Web (68,605 of them in the US). And it gets worse: 22,000 of them use default SSL certificates, enabling easy man-in-the-middle (MitM) attacks.<\/p>\n<p>Even aside from the 21 new ones, less than 10% of those 86,000 devices are hardened to already publicly known vulnerabilities.<\/p>\n<p>Among those running management interfaces, 80% are at end of life, meaning that they cannot be patched any longer.<\/p>\n<p><a href=\"https:\/\/www.darkreading.com\/edge\/why-legacy-system-users-prioritize-uptime-over-security\" target=\"_blank\" rel=\"noopener\">Unpatched legacy equipment is common in industrial settings<\/a> due to the extra difficulty, expense, and risk involved in updating or replacing certain specific, critical software and machinery running 24\/7. But, dos Santos says, this habit seems to have extended to devices which don&#8217;t necessarily fall into that category.<\/p>\n<p>&#8220;I believe that people tend to think: it&#8217;s still in the OT world, so it&#8217;s legacy,&#8221; he concludes. &#8220;We don&#8217;t need to replace it right now. But that&#8217;s definitely problematic, and this is one area of the OT perimeter that could be helped in upgrading devices.&#8221; <\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/21-vulnerabilities-discovered-crucial-it-ot-connective-routers\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this Black Hat Europe preview, devices bridging critical machinery with the wider Internet are exposed and subject to numerous supply chain-induced bugs.Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/21-vulnerabilities-discovered-crucial-it-ot-connective-routers\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-54516","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-14T19:14:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt22304de8cf7c0214\/6553948a996a61040a5e28a2\/Industrial_plant-Kevin_Brine-Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers\",\"datePublished\":\"2023-11-14T19:14:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\\\/\"},\"wordCount\":582,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt22304de8cf7c0214\\\/6553948a996a61040a5e28a2\\\/Industrial_plant-Kevin_Brine-Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\\\/\",\"name\":\"21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt22304de8cf7c0214\\\/6553948a996a61040a5e28a2\\\/Industrial_plant-Kevin_Brine-Alamy.jpg\",\"datePublished\":\"2023-11-14T19:14:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt22304de8cf7c0214\\\/6553948a996a61040a5e28a2\\\/Industrial_plant-Kevin_Brine-Alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt22304de8cf7c0214\\\/6553948a996a61040a5e28a2\\\/Industrial_plant-Kevin_Brine-Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/","og_locale":"en_US","og_type":"article","og_title":"21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-11-14T19:14:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt22304de8cf7c0214\/6553948a996a61040a5e28a2\/Industrial_plant-Kevin_Brine-Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers","datePublished":"2023-11-14T19:14:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/"},"wordCount":582,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt22304de8cf7c0214\/6553948a996a61040a5e28a2\/Industrial_plant-Kevin_Brine-Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/","url":"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/","name":"21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt22304de8cf7c0214\/6553948a996a61040a5e28a2\/Industrial_plant-Kevin_Brine-Alamy.jpg","datePublished":"2023-11-14T19:14:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt22304de8cf7c0214\/6553948a996a61040a5e28a2\/Industrial_plant-Kevin_Brine-Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt22304de8cf7c0214\/6553948a996a61040a5e28a2\/Industrial_plant-Kevin_Brine-Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54516"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54516\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}