Summary: http://tech.slashdot.org/story/14/04/22/001239/intentional-backdoor-in-consumer-routers-found More details: http://arstechnica.com/security/201...-merely-hides-backdoor-instead-of-closing-it/ Full technical details (extremely low level; those familiar with C and assembly will understand): http://www.synacktiv.com/ressources/TCP32764_backdoor_again.pdf Also attached PDF here on the forum (in case it disappears) Partial vulnerability lists (yes, 2nd URL is very long): http://tech.slashdot.org/comments.pl?sid=5062537&cid=46811329 https://wikidevi.com/w/index.php?title=Special:Ask&q=[[Manuf::SerComm]] [[Global type::~embedded*]]&po=?FCC ID ?FCC approval date=FCC date ?Estimated date of release=Est. release date ?Embedded system type ?CPU1 brand ?CPU1 model=CPU1 mdl. &eq=yes&p[format]=broadtable&sort_num=&order_num=ASC&p[limit]=500&p[offset]=&p[link]=all&p[sort]=&p[headers]=show&p[mainlabel]=&p[intro]=&p[outro]=&p[searchlabel]=… further results&p[default]=&p[class]=sortable wikitable smwtable&eq=yes TomatoUSB is not vulnerable to this problem, regardless of what model router is used. TomatoUSB does not include anything called ft_tool or scfgmgr. Hope this helps nullify any concerns, inhibiting people from posting and going wild.