In-Store or Curbside Pickup:
• Orders must be placed from 8 AM – 5 PM, Mon – Sat, and Sun before 2 PM (excluding holidays).
• We’ll email you when your order is ready for pickup. Your order will be held for 3 days from the time it's placed.
• Please bring photo ID and credit/debit card only if used as payment.
• In-Store Pickup is available across the U.S. at participating Verizon Wireless stores.
• Curbside Pickup available at select stores.
• Same-day delivery is available in select areas.
• If same-day delivery is available for your order, you’ll be able to choose that option at checkout.
Thanks - I still get the padlock with the red slash when I go to 192.168.1.1, but Verizon says it's a browser quirk, and I should ignore it. I changed the password.
RB Groove (new)
RB Omnitik (new)
Other QNAP NAS devices running QTS software
PBE M5 (new)
Unknown Models* (new)
ZXHN H108N (new)
06-08-2018 02:45 AM
Why isn't VERIZON itself not putting out more official information & guidance on this??
Seems like a pretty big deal, and this service provider is not exactly cheap.
Because it is not something affecting their routers or network.
why alarm folks over nothing?
06-10-2018 05:37 PM
Note that as of June 1, VZ has put out a rather vague VPNFilter advisory with a blanket recommendation to reboot, in broad context of "the various routers we provide." It neglects to say when or how often.
Given the way VPNFilter is moving, I'd like to see much more from VZ, to the effect that they are actively monitoring and ensuring their device OEMs are working to keep their firmware ahead of the threat, including specific dates on which each VZ router brand-name has been remotely updated, if that is the case. Rebooting prior to such a date won't help much.
This appears to be a hostile nation-state attack, and it may only be a matter of time until they move across the less common devices.
06-11-2018 05:54 PM
I agree and am concerned with relative silence from Verizon on this VPNflter malware and othr security issues, which I hear about nearly every day in other forums. Internet security and communication with customers should be high priority and I have received nothing from Verizon about this. I would rather be proactive than try to clean up a mess.
06-12-2018 02:17 AM
...and why is this flagged as solved??? it's actually evolving.
Because the original question was solved to the original posters satisfaction.
the additional comments and solutions were just thread hyjacking.
06-15-2018 05:43 PM
I posted it solved because I was asking what Verizon equipment was or would be patched. At this point it appears the answer is none.
I appreciate all the other comments since I believe this is a major problem. All the ISPs should take responsibility for their customer equipment security. We are paying for this service.
Dear Good People of this Verizon Customers' Community (which I just joined):
Aren't we all concerned about the FBI's warning that malware is infecting many American routers?! Are we following their advice to reboot our routers and update the firmware and strengthen our usernames and passwords? Here's an article from The New York Times:
Here's a follow-up story:
And here's advice from the follow-up:
■ If you use a router provided by a broadband provider like Comcast or Verizon, call the customer service department and ask whether your equipment has been updated with the latest firmware.
I've not called Verizon; I'm waiting for them to come to us. Verizon, are you reading this posting? Please acknowledge the threat and inform us fully of how you're dealing with it and tell us what steps we little guys need to do to stay safe on the Internet.