![Amazon.com: MikroTik hAP AC RouterBoard, Triple Chain Access Point 802.11ac (RB962UiGS-5HacT2HnT-US) : Electronics Amazon.com: MikroTik hAP AC RouterBoard, Triple Chain Access Point 802.11ac (RB962UiGS-5HacT2HnT-US) : Electronics](https://m.media-amazon.com/images/I/41m5-z19P9L._AC_.jpg)
Amazon.com: MikroTik hAP AC RouterBoard, Triple Chain Access Point 802.11ac (RB962UiGS-5HacT2HnT-US) : Electronics
![Uncovering Trickbot's use of IoT devices in command-and-control infrastructure | Microsoft Security Blog Uncovering Trickbot's use of IoT devices in command-and-control infrastructure | Microsoft Security Blog](https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2022/03/trickbot-mikrotik-image-social.png)
Uncovering Trickbot's use of IoT devices in command-and-control infrastructure | Microsoft Security Blog
![GitHub - 0x802/MikrotikSploit: MikrotikSploit is a script that searches for and exploits Mikrotik network vulnerabilities GitHub - 0x802/MikrotikSploit: MikrotikSploit is a script that searches for and exploits Mikrotik network vulnerabilities](https://raw.githubusercontent.com/0x802/MikrotikSploit/master/modules/images/b1.png)
GitHub - 0x802/MikrotikSploit: MikrotikSploit is a script that searches for and exploits Mikrotik network vulnerabilities
![hackerfantastic.crypto on Twitter: "Here is "@mikrotik_com RouterOS <= 6.43.7 post-authentication local root arbitrary file creation #0day." On versions prior to 6.40 this can be used to trivially jailbreak a RouterOS device - hackerfantastic.crypto on Twitter: "Here is "@mikrotik_com RouterOS <= 6.43.7 post-authentication local root arbitrary file creation #0day." On versions prior to 6.40 this can be used to trivially jailbreak a RouterOS device -](https://pbs.twimg.com/media/DuJqpu-W0AAI1fk.jpg)