<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>wifi — LowEndSpirit</title>
        <link>https://staging.lowendspirit.com/index.php?p=/</link>
        <pubDate>Fri, 10 Apr 2026 11:28:43 +0000</pubDate>
        <language>en</language>
            <description>wifi — LowEndSpirit</description>
    <atom:link href="https://staging.lowendspirit.com/index.php?p=/discussions/tagged/wifi/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>Creative or Unusual WiFi SSID Names?</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/5333/creative-or-unusual-wifi-ssid-names</link>
        <pubDate>Mon, 23 Jan 2023 12:55:52 +0000</pubDate>
        <category>General</category>
        <dc:creator>xleet</dc:creator>
        <guid isPermaLink="false">5333@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>Most of my neighbors still use the default SSIDs that came with their access points, but I do see a few creative names around me:</p>

<ul>
<li>"Get your own WIFI"</li>
<li>"PayMeeeeee"</li>
<li>"SMITH HOUSE BABY" - Nearby neighbors are Smith, but their only child is starting college.</li>
<li>"Pumma da GOAT" - My best guess is they are a fan of fashion model Pumma Santiago, but that's a guess. (I assume that GOAT stands for "greatest of all time.")</li>
<li>(A local baseball star's name - well known in Major League Baseball) - It is almost certainly a fan, not the player's residence.</li>
</ul>

<p>My hunch is that the people on LowEndSpirit have seen many strange and quirky WiFi access point names around them.</p>
]]>
        </description>
    </item>
    <item>
        <title>LowEnd Segmented Wireless and Wired VLAN Networks</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/4603/lowend-segmented-wireless-and-wired-vlan-networks</link>
        <pubDate>Sat, 17 Sep 2022 17:44:33 +0000</pubDate>
        <category>Technical</category>
        <dc:creator>xleet</dc:creator>
        <guid isPermaLink="false">4603@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>I would like to segment my home network into separate VLANs. The goal is to prevent appliances like doorbell cameras and video streaming devices from accessing the LAN that residents use for their personal computers and phones.</p>

<p>That means several WiFi SSIDs that are on separate LAN segments. I have switches that support 802.1q VLAN tagging, but they are still operating as unmanaged switches.</p>

<p>Which firewall would you recommend that supports this kind of networking with VLAN tagging? <br />
Which access points would you recommend that support multiple SSIDs (say 8 different ones) with appropriate VLAN tagging?</p>
]]>
        </description>
    </item>
    <item>
        <title>Multiple Vulnerabilities in Wi-Fi Enabled Devices Could Allow for Data Exfiltration</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/2920/multiple-vulnerabilities-in-wi-fi-enabled-devices-could-allow-for-data-exfiltration</link>
        <pubDate>Fri, 14 May 2021 06:32:40 +0000</pubDate>
        <category>Technical</category>
        <dc:creator>mikho</dc:creator>
        <guid isPermaLink="false">2920@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>Source: S.Bradley</p>

<hr />

<p>TLP: WHITE<br />
MS-ISAC CYBERSECURITY ADVISORY</p>

<p>MS-ISAC ADVISORY NUMBER: 2021-068</p>

<p>DATE(S) ISSUED: 05/12/2021</p>

<p>SUBJECT: Multiple Vulnerabilities in Wi-Fi Enabled Devices Could Allow for Data Exfiltration</p>

<p>OVERVIEW:</p>

<p>Multiple vulnerabilities have been discovered in Wi-Fi enabled devices, the most severe of which could allow for data exfiltration. IEEE 802.11 is part of the IEEE 802 set of local area network technical standards, and specifies the set of medium access control and physical layer protocols for implementing wireless local area network communication. Successful exploitation of the most severe of these vulnerabilities could allow an attacker to exfiltrate user data.</p>

<p>THREAT INTELLIGENCE:</p>

<p>There are currently no reports of these vulnerabilities being exploited in the wild. A proof of concept exists for various vulnerabilities mentioned within this advisory.</p>

<p>SYSTEMS AFFECTED:</p>

<p>Any Wi-Fi enabled device could be vulnerable, please check with the manufacturer of your device(s)<br />
RISK:</p>

<p>Government:</p>

<p>Large and medium government entities: High<br />
Small government entities: High<br />
Businesses:</p>

<p>Large and medium business entities: High<br />
Small business entities: High<br />
Home users: High</p>

<p>TECHNICAL SUMMARY:</p>

<p>Multiple vulnerabilities have been discovered in Wi-Fi enabled devices, the most severe of which could allow for data exfiltration. These vulnerabilities can be exploited if a user connects to a rogue access point and is then redirected to or visits a malicious server. Details of the vulnerabilities are as follows:</p>

<p>A vulnerability exists in the 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) that could allow an attacker to inject arbitrary network packets (CVE-2020-24588)<br />
A vulnerability exists in the 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) that could allow an attacker to decrypt selected fragments when another device sends fragmented frames. (CVE-2020-24587)<br />
A vulnerability exists in the 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) that could allow an attacker to inject arbitrary network packets and/or exfiltrate user data. (CVE-2020-24586)<br />
A vulnerability exists in Samsung Galaxy S3 i9305 4.4.4 devices that could allow an attacker to inject arbitrary network packets independent of the network configuration. (CVE-2020-26145)<br />
A vulnerability exists in Samsung Galaxy S3 i9305 4.4.4 devices that could allow an attacker to inject arbitrary network packets independent of the network configuration. (CVE-2020-26144)<br />
A vulnerability exists in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H that could allow an attacker to inject arbitrary data frames independent of the network configuration. (CVE-2020-26140)<br />
A vulnerability exists in the ALFA Windows 10 driver 1030.36.604 for AWUS036ACH could allow an attacker to inject arbitrary data frames independent of the network configuration. (CVE-2020-26143)<br />
A vulnerability exists in the kernel in NetBSD 7.1 that could allow an attacker to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients. (CVE-2020-26139)<br />
A vulnerability exists in Samsung Galaxy S3 i9305 4.4.4 devices that could allow an attacker to exfiltrate selected fragments. (CVE-2020-26146)<br />
A vulnerability exists in the Linux kernel 5.8.9 that could allow an attacker to inject packets and/or exfiltrate selected fragments (CVE-2020-26147)<br />
A vulnerability exists in the kernel in OpenBSD 6.6 that could allow an attacker to inject arbitrary network packets, independent of the network configuration. (CVE-2020-26142)<br />
A vulnerability exists in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H that could allow an attacker to inject and possibly decrypt packets. (CVE-2020-26141)<br />
Successful exploitation of the most severe of these vulnerabilities could allow an attacker to exfiltrate of user data.</p>

<p>RECOMMENDATIONS:</p>

<p>We recommend the following actions be taken:</p>

<p>Apply the stable channel update provided by the vendor to vulnerable systems immediately after appropriate testing.<br />
Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.<br />
Inform and educate users regarding the threats posed by hypertext links contained in emails or attachments especially from un-trusted sources.<br />
REFERENCES:</p>

<p>Wi-Fi Alliance:</p>

<p><a href="https://www.wi-fi.org/security-update-fragmentation" rel="nofollow">https://www.wi-fi.org/security-update-fragmentation</a></p>

<p>FragAttack:</p>

<p><a href="https://www.fragattacks.com/#beingexploit" rel="nofollow">https://www.fragattacks.com/#beingexploit</a></p>

<p>CVE:</p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26145" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26145</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26144" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26144</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26140" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26140</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26143" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26143</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26146" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26146</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26142" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26142</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141</a></p>
]]>
        </description>
    </item>
   </channel>
</rss>
