During installation, the router sent several data packets to an Amazon server in the US. These packets contained the configured SSID name and password in clear text, as well as some identification tokens for this network within a broader database and an access token for a user session that could potentially enable a MITM attack.
Linksys has refused to acknowledge/respond to the issue.
They specifically didn’t say they’re using enterprise. Diy open source solutions such as a ddwrt router for example doesn’t exactly fit in the “consumer” nor the “enterprise” category.