And once agian why Password security and closeing unused ports is your first line in defense against getting Pwned "Attack vectors are primarily TELNET or SSH that listen on the device's WAN interface, accepting weak passwords (such as admin)."