A bit worrying... This chap seems to have found that a number of (mainly consumer grade) routers and wireless access points have a process listening on port 32764/tcp. He has published a proof of concept that allows unauthenticated attackers to reset the router to default settings.
The post is techincal quite technical in places, and it is difficult, at least a first glance to build an idea of exactly where this fits of the scale of "bad".... to "very bad".... through "extremly bad" or even "outright terrible"
There is a list of vulnerable devices emerging on the site.
The exploit had been public now for a few days and it seems that the bad guys are already probing for vulnerable devices https://isc.sans.org/diary/Scans+Increase+for+New+Linksys+Backdoor+%2832764TCP%29/17336
An interesting thing is that the vulnerable devices include routers from both Netgear and Linksys/CIsco.
Time to check your routers and upgrade firmware maybe? (if indeed you can find clean firmware for your device - many of the devices on the list are EOL).
Edited by x64, 07 January 2014 - 02:42 PM.