Hi, Boggins
Please see the attached . The rom jraju1451954 problem resolved.
I tried all sort of things like selecting SPI enabled , giving password tight etc. But still avast found rom O vulnerability again and again.
Just went to this author, Shane, other site pcwintech and downloaded the simple port forwarding tool . It captured my router, but not in my vendor name. I just first tried to forward port 80 to unused ip port in my computer. Still the problem continued.
I again enabled spi and checked with grc.com
still the problem existed.
Coming to the point. I tried to locate the weak port 7457 which is said to inject vulnerability to rom 0. I will enclose the details of the injection in next post if possible. It is a lengthy article, which described about this vulnerability and how any program could easily change it.
I tried again at the grc.com, it shows all the port stealthy, but still i got this rom 0.
I then opened Shane tool and then took the risk of just updating the router, it suddenly started downloading the updates from somewhere and i saved it.
In the interval, i tried any internet block yellow. Nothing happened. Then the sweet surprise.
I checked again in avast and bingo, the vulnerability gone.
To shane:
What a wonderful free program that you give. Eventhough my router name was not in the list, it shows the router as something and picture as something. But anyhow, taking the risk,of updating router, no file available elsewhere, from your database or source, i was updated within seconds. How it is possible to have this cure. My vendor is teracom, and the avast shows it as Mediatek. Is the firmware suited my modem, or the modem firmware was captured by your program.
In these days of router hack, your tool is a blessing in disguise. Thank you , shane