IN SCOPE

 

  • Linksys routers, range extenders, WiFi dongles, switches, and other networked devices

NOT IN SCOPE

 

Any services or systems that are hosted by third party providers or Linksys owned property, services be it physical or intellectual. This includes and is may not only limited to: 

  • Linksys.com web endpoints
  • Linksys Smart WiFi web and cloud endpoints
  • Social Engineering and Phishing attacks against Linksys employees, contractors, customers, or support

HOW TO SUBMIT

 

PLEASE READ THE ENTIRE PAGE PRIOR TO SUBMITTING A VULNERABILITY.

If you need help finding your WiFi password or believe your router has been hacked, please contact Technical support here.

Please click here to submit your vulnerability.

DISCLOSURE

 

After receiving your vulnerability report, the Linksys security team will review your report and commission a fix to our remediation team. After Linksys publishes the fix for the affected SKUs listed in your report, Linksys will give the green light to disclose the vulnerability.

We ask that all coordinated vulnerability disclosures contain the following information: 

  • A link to the firmware download page containing the fixed firmware
  • A sentence or two in either the title of the disclosure or in the first few paragraphs confirming that a fix for the vulnerability is available
  • Accurate representation of the attack details per the CVSSv3 guidelines (LAN-only attacks are “Local” not “Remote”, etc.)

LEGAL STATEMENT

To encourage a healthy working relationship with the security research community, Linksys promises not to engage in legal action against individuals who:

  • Report vulnerabilities while following the guidelines set by Linksys's Vulnerability Disclosure Program.
  • Engage in vulnerability testing within the scope listed above.
  • Perform security tests on their own Linksys products.
  • Perform security tests on Linksys products with the consent of the owner of the product.