![Linksys wrt54g2 disable wifi protected setup](https://kumkoniak.com/101.jpg)
The key element I'm concerned with though, is where it says "Wi-Fi Protected Setup Status: Configured". Also, below this section are configuration details of the WPA2 PSKs for each radio band. However, if I select the Wi-Fi Protected Setup radio button under Basic Wireless Settings, I see this:
![linksys wrt54g2 disable wifi protected setup linksys wrt54g2 disable wifi protected setup](https://lasopaforms168.weebly.com/uploads/1/2/5/8/125842399/228947172.jpeg)
No mention of Wi-Fi Protected Setup in there. If I go to the Wireless Security section, I only see the options for configuring my passphrase on each band. Nothing here, aside from the Wi-Fi Protected Setup radio button, addresses anything related to security. When I go to the Wireless section of my routers' configuration sites, (both appear the same, in regards to this post) I see this:īelow that is my basic wireless radio configuration options (Network Mode, Network Name (SSID), Channel Width, Wide Channel, Standard Channel, SSID Broadcast) for each of the 2.4 and 5 GHz bands. However, on my Linksys routers (WRT400N and E3000), I can't see a way to do that. So, I'd like to disable the WPS feature as suggested. The fact that there is a side-channel attack which can easily circumvent this protection bothers me a bit. I use randomly-generated 63-character PSKs which I either manually enter or cut-and-paste to client devices. I personally don't use the WPS feature at all.
![linksys wrt54g2 disable wifi protected setup linksys wrt54g2 disable wifi protected setup](https://bermomill.weebly.com/uploads/1/2/7/6/127664661/467336650.jpg)
The only known work-around is to disable the WPS feature.
![linksys wrt54g2 disable wifi protected setup linksys wrt54g2 disable wifi protected setup](http://i.stack.imgur.com/c3Kae.jpg)
This remains effective even if the victim changes their PSK. The WPS PIN can be (relatively) easily brute-forced, and this can lead to revelation of the WPA2 PSK. The exploit is done by abusing a design flaw in the Wi-Fi Protected Setup (WPS) feature that is common to most routers. In short, this describes how modern wireless routers can have their PSKs discovered within just a matter of hours - even if they're using WPA2 with a strong PSK. US-CERT recently released Vulnerability Note VU#723755.
![Linksys wrt54g2 disable wifi protected setup](https://kumkoniak.com/101.jpg)