Another day, another uPnP mass hack: https://arstechnica.com/information-technology/2018/11/mass-router-hack-exposes-millions-of-devices-to-potent-nsa-exploit/
Of course, I’ve disabled uPnP on my router, but why take the router’s word for it? Tenable released this handy Python utility a while back:
It lets you know what devices in multicast range have uPnP enabled, as well as enumerating the service XML description. Handy!