<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://mirror.consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kloosy+goosy</id>
	<title>Consumer Rights Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://mirror.consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kloosy+goosy"/>
	<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/w/Special:Contributions/Kloosy_goosy"/>
	<updated>2026-05-20T00:30:09Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.44.0</generator>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Zyxel&amp;diff=20558</id>
		<title>Zyxel</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Zyxel&amp;diff=20558"/>
		<updated>2025-08-17T21:05:56Z</updated>

		<summary type="html">&lt;p&gt;Kloosy goosy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Stub}}{{CompanyCargo&lt;br /&gt;
| Founded = 1989&lt;br /&gt;
| Industry = Telecommunication&lt;br /&gt;
| Logo = Zyxel Logo.png&lt;br /&gt;
| ParentCompany = Zyxel Group Corp&lt;br /&gt;
| Type = Private&lt;br /&gt;
| Website = https://www.zyxel.com/&lt;br /&gt;
}}&lt;br /&gt;
[[wikipedia:Zyxel|Zyxel]]  is a telecommunication company that was founded in 1989 in Taiwan. They are most known to create consumer grade routers but also produces enterprise equipment.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Zyxel Communications Corporation is&#039;&#039;&#039; a subisidiary of  Zyxel Group Corporation. &lt;br /&gt;
&lt;br /&gt;
==Incidents==&lt;br /&gt;
&lt;br /&gt;
===Zyxel refuses to release patches for actively exploited zero day vulnerabilities(2024-2025)===&lt;br /&gt;
Zyxel released a statement where they have no plans to release a patch for two actively exploited flaws in its routers, potentially affecting thousands of customers.&lt;br /&gt;
&lt;br /&gt;
Zyxel advised customers to buy new routers despite the affected routers were still possible to buy online.&amp;lt;ref&amp;gt;{{Cite web |date=2025-02-04 |title=Zyxel security advisory for command injection and insecure default credentials vulnerabilities in certain legacy DSL CPE |url=https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 |url-status=live |archive-url=https://web.archive.org/web/20250209091247/https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 |archive-date=2025-02-09 |website=Zyxel}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |last=Page |first=Carly |date=5 Feb 2025 |title=Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers |url=https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/ |url-status=live |access-date=28 Mar 2025 |website=TechCrunch}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |last=Whittaker |first=Zack |date=5 Feb 2025 |title=Wow. Router maker Zyxel says it has no plans to release a patch for two *actively exploited* flaws in its routers affecting potentially thousands of customers. Instead, Zyxel is advising customers to rip out affected devices and buy new routers. However, the affected buggy routers are still available for purchase. |url=https://mastodon.social/@zackwhittaker/113951421812871589 |url-status=live |access-date=28 Mar 2025 |website=Mastodon}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Kloosy goosy</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=3CX&amp;diff=20557</id>
		<title>3CX</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=3CX&amp;diff=20557"/>
		<updated>2025-08-17T21:05:41Z</updated>

		<summary type="html">&lt;p&gt;Kloosy goosy: Added wikipedia link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StubNotice}}&lt;br /&gt;
[[wikipedia:3CX|3CX, Inc.]], is a software development company and developer of the 3CX Phone System&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web |last= |title=ENTERPRISE GRADE PHONE SYSTEM |url=https://www.3cx.com/phone-system/ |archive-url=https://web.archive.org/web/20250813032918/https://www.3cx.com/phone-system/ |archive-date=2025-08-13 |access-date=2025-08-13 |website=3cx.com}}&amp;lt;/ref&amp;gt; founded in Cyprus in 2005-11-01.&lt;br /&gt;
&lt;br /&gt;
{{CompanyCargo&lt;br /&gt;
| Founded = 2005-11-01&lt;br /&gt;
| Industry = Telecommunication&lt;br /&gt;
| Website = https://www.3cx.com/&lt;br /&gt;
| Logo = 3CX Logo Grey background-1028917583.png&lt;br /&gt;
| Type = Private&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
The 3CX Phone System is a software private branch exchange based on the [[wikipedia:Session_Initiation_Protocol|Session Initiation Protocol]] (SIP) standard to allow calls via the public switched telephone network (PSTN) or via [[wikipedia:Voice_over_IP|Voice over Internet Protocol]] (VoIP) services &amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
In 2023, during a major supply chain attack affecting the 3CX desktop application, company&#039;s public response included engaging the services of Google-owned cybersecurity firm [[wikipedia:Mandiant|Mandiant]]&amp;lt;ref&amp;gt;{{Cite web |last=Lakshmanan |first=Ravie |date=Mar 31, 2023 |title=3CX Supply Chain Attack — Here&#039;s What We Know So Far |url=https://thehackernews.com/2023/03/3cx-supply-chain-attack-heres-what-we.html |archive-url=https://web.archive.org/web/20250627055223/https://thehackernews.com/2023/03/3cx-supply-chain-attack-heres-what-we.html |archive-date=June 27, 2025 |access-date=2025-08-12 |website=thehackernews.com}}&amp;lt;/ref&amp;gt; and advising customers to uninstall affected versions. &lt;br /&gt;
&lt;br /&gt;
==Controversies==&lt;br /&gt;
&lt;br /&gt;
====Customer and Partner Relations====&lt;br /&gt;
The company&#039;s CTO, Nick Galea, has been the subject of criticism from some 3CX users and partners for alleged heavy-handed moderation practices and perceived unprofessional conduct in public forums. Multiple users on Reddit have reported being banned from the official 3CX community forums for raising technical concerns or criticizing company policies. &amp;lt;ref&amp;gt;{{Cite web |title=My 3CX Partnership Deleted and All Linked Clients Lost |url=https://www.reddit.com/r/3CX/comments/xev0u5/my_3cx_partnership_deleted_and_all_linked_clients/}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Banned from the 3CX Community |url=https://www.reddit.com/r/3CX/comments/xn0ztp/banned_from_the_3cx_community/}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Supply Chain Incident Response====&lt;br /&gt;
In March 2023, 3CX was the victim of a high-profile supply chain attack, thought to be the result of a cascade failure starting with the software X_Trader. This attack was linked to an earlier hack by North Korean hackers to software company [https://www.marketswiki.com/wiki/Trading_Technologies_International Trading Technologies]. A 3CX employee&#039;s PC with the Trading Technologies App was used by the hackers to compromise their software and distribute malware to consumers. &amp;lt;ref&amp;gt;{{Cite news |last=Greenberg |first=Andy |date=Apr 20, 2023 |title=The Huge 3CX Breach Was Actually 2 Linked Supply Chain Attacks |url=https://www.wired.com/story/3cx-supply-chain-attack-times-two/ |archive-url=https://web.archive.org/web/20250726115243/https://www.wired.com/story/3cx-supply-chain-attack-times-two/ |archive-date=July 26, 2025 |work=Wired |pages=2025-08-12}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3CX also faced backlash for requiring users to pay to open support tickets during the breach, which led to further public criticism from system administrators and IT professionals.&amp;lt;ref&amp;gt;{{Cite web |last=CrowdStrike |date=2023-03-29 |title=// 2023-03-29 // SITUATIONAL AWARENESS // CrowdStrike Tracking Active Intrusion Campaign Targeting 3CX Customers // |url=https://www.reddit.com/r/crowdstrike/comments/125r3uu/20230329_situational_awareness_crowdstrike/ |website=reddit}}&amp;lt;/ref&amp;gt;&amp;lt;blockquote&amp;gt;&amp;quot;I have been in contact with 3CX and their suggestion is to open a support ticket at £75 per incident. Ludicrous.&amp;quot; -wars_t (reddit.com) &amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References:==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
[[Category:3CX]]&lt;/div&gt;</summary>
		<author><name>Kloosy goosy</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Zyxel&amp;diff=20556</id>
		<title>Zyxel</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Zyxel&amp;diff=20556"/>
		<updated>2025-08-17T21:00:42Z</updated>

		<summary type="html">&lt;p&gt;Kloosy goosy: Added company cargo, added which country it was founded in, moved incident into the incident tab, removed unused headers. cleaned the references.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Stub}}{{CompanyCargo&lt;br /&gt;
| Founded = 1989&lt;br /&gt;
| Industry = Telecommunication&lt;br /&gt;
| Logo = Zyxel Logo.png&lt;br /&gt;
| ParentCompany = Zyxel Group Corp&lt;br /&gt;
| Type = Private&lt;br /&gt;
| Website = https://www.zyxel.com/&lt;br /&gt;
}}&lt;br /&gt;
Zyxel  is a telecommunication company that was founded in 1989 in Taiwan. They are most known to create consumer grade routers but also produces enterprise equipment.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Zyxel Communications Corporation is&#039;&#039;&#039; a subisidiary of  Zyxel Group Corporation. &lt;br /&gt;
&lt;br /&gt;
==Incidents==&lt;br /&gt;
&lt;br /&gt;
=== Zyxel refuses to release patches for actively exploited zero day vulnerabilities(2024-2025) ===&lt;br /&gt;
Zyxel released a statement where they have no plans to release a patch for two actively exploited flaws in its routers, potentially affecting thousands of customers.&lt;br /&gt;
&lt;br /&gt;
Zyxel advised customers to buy new routers despite the affected routers were still possible to buy online.&amp;lt;ref&amp;gt;{{Cite web |date=2025-02-04 |title=Zyxel security advisory for command injection and insecure default credentials vulnerabilities in certain legacy DSL CPE |url=https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 |url-status=live |archive-url=https://web.archive.org/web/20250209091247/https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 |archive-date=2025-02-09 |website=Zyxel}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |last=Page |first=Carly |date=5 Feb 2025 |title=Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers |url=https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/ |url-status=live |access-date=28 Mar 2025 |website=TechCrunch}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |last=Whittaker |first=Zack |date=5 Feb 2025 |title=Wow. Router maker Zyxel says it has no plans to release a patch for two *actively exploited* flaws in its routers affecting potentially thousands of customers. Instead, Zyxel is advising customers to rip out affected devices and buy new routers. However, the affected buggy routers are still available for purchase. |url=https://mastodon.social/@zackwhittaker/113951421812871589 |url-status=live |access-date=28 Mar 2025 |website=Mastodon}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Kloosy goosy</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=3CX&amp;diff=20541</id>
		<title>3CX</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=3CX&amp;diff=20541"/>
		<updated>2025-08-17T20:29:23Z</updated>

		<summary type="html">&lt;p&gt;Kloosy goosy: Added company cargo, added which country it was founded in&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StubNotice}}&lt;br /&gt;
3CX, Inc., is a software development company and developer of the 3CX Phone System&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web |last= |title=ENTERPRISE GRADE PHONE SYSTEM |url=https://www.3cx.com/phone-system/ |archive-url=https://web.archive.org/web/20250813032918/https://www.3cx.com/phone-system/ |archive-date=2025-08-13 |access-date=2025-08-13 |website=3cx.com}}&amp;lt;/ref&amp;gt; founded in Cyprus in 2005-11-01.&lt;br /&gt;
&lt;br /&gt;
{{CompanyCargo&lt;br /&gt;
| Founded = 2005-11-01&lt;br /&gt;
| Industry = Telecommunication&lt;br /&gt;
| Website = https://www.3cx.com/&lt;br /&gt;
| Logo = 3CX Logo Grey background-1028917583.png&lt;br /&gt;
| Type = Private&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
The 3CX Phone System is a software private branch exchange based on the [[wikipedia:Session_Initiation_Protocol|Session Initiation Protocol]] (SIP) standard to allow calls via the public switched telephone network (PSTN) or via [[wikipedia:Voice_over_IP|Voice over Internet Protocol]] (VoIP) services &amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
In 2023, during a major supply chain attack affecting the 3CX desktop application, company&#039;s public response included engaging the services of Google-owned cybersecurity firm [[wikipedia:Mandiant|Mandiant]]&amp;lt;ref&amp;gt;{{Cite web |last=Lakshmanan |first=Ravie |date=Mar 31, 2023 |title=3CX Supply Chain Attack — Here&#039;s What We Know So Far |url=https://thehackernews.com/2023/03/3cx-supply-chain-attack-heres-what-we.html |archive-url=https://web.archive.org/web/20250627055223/https://thehackernews.com/2023/03/3cx-supply-chain-attack-heres-what-we.html |archive-date=June 27, 2025 |access-date=2025-08-12 |website=thehackernews.com}}&amp;lt;/ref&amp;gt; and advising customers to uninstall affected versions. &lt;br /&gt;
&lt;br /&gt;
==Controversies==&lt;br /&gt;
&lt;br /&gt;
====Customer and Partner Relations====&lt;br /&gt;
The company&#039;s CTO, Nick Galea, has been the subject of criticism from some 3CX users and partners for alleged heavy-handed moderation practices and perceived unprofessional conduct in public forums. Multiple users on Reddit have reported being banned from the official 3CX community forums for raising technical concerns or criticizing company policies. &amp;lt;ref&amp;gt;{{Cite web |title=My 3CX Partnership Deleted and All Linked Clients Lost |url=https://www.reddit.com/r/3CX/comments/xev0u5/my_3cx_partnership_deleted_and_all_linked_clients/}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Banned from the 3CX Community |url=https://www.reddit.com/r/3CX/comments/xn0ztp/banned_from_the_3cx_community/}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Supply Chain Incident Response====&lt;br /&gt;
In March 2023, 3CX was the victim of a high-profile supply chain attack, thought to be the result of a cascade failure starting with the software X_Trader. This attack was linked to an earlier hack by North Korean hackers to software company [https://www.marketswiki.com/wiki/Trading_Technologies_International Trading Technologies]. A 3CX employee&#039;s PC with the Trading Technologies App was used by the hackers to compromise their software and distribute malware to consumers. &amp;lt;ref&amp;gt;{{Cite news |last=Greenberg |first=Andy |date=Apr 20, 2023 |title=The Huge 3CX Breach Was Actually 2 Linked Supply Chain Attacks |url=https://www.wired.com/story/3cx-supply-chain-attack-times-two/ |archive-url=https://web.archive.org/web/20250726115243/https://www.wired.com/story/3cx-supply-chain-attack-times-two/ |archive-date=July 26, 2025 |work=Wired |pages=2025-08-12}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3CX also faced backlash for requiring users to pay to open support tickets during the breach, which led to further public criticism from system administrators and IT professionals.&amp;lt;ref&amp;gt;{{Cite web |last=CrowdStrike |date=2023-03-29 |title=// 2023-03-29 // SITUATIONAL AWARENESS // CrowdStrike Tracking Active Intrusion Campaign Targeting 3CX Customers // |url=https://www.reddit.com/r/crowdstrike/comments/125r3uu/20230329_situational_awareness_crowdstrike/ |website=reddit}}&amp;lt;/ref&amp;gt;&amp;lt;blockquote&amp;gt;&amp;quot;I have been in contact with 3CX and their suggestion is to open a support ticket at £75 per incident. Ludicrous.&amp;quot; -wars_t (reddit.com) &amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References:==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
[[Category:3CX]]&lt;/div&gt;</summary>
		<author><name>Kloosy goosy</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Rohde_%26_Schwarz&amp;diff=14904</id>
		<title>Rohde &amp; Schwarz</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Rohde_%26_Schwarz&amp;diff=14904"/>
		<updated>2025-06-02T22:41:40Z</updated>

		<summary type="html">&lt;p&gt;Kloosy goosy: Created Rohde &amp;amp; Schwartz article. Todo: Create Incident page to go indepth about the incident. write the wiki page better. Add more references&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{InfoboxCompany&lt;br /&gt;
| Name = Rohde &amp;amp; Schwarz GmbH &amp;amp; Co. KG&lt;br /&gt;
| Type =Private&lt;br /&gt;
| Founded =1933&lt;br /&gt;
| Industry =Electronic test equipment&lt;br /&gt;
| Official Website =https://www.rohde-schwarz.com&lt;br /&gt;
| Logo =Rohde schwars logo Images.png&lt;br /&gt;
}}[[wikipedia:Rohde_&amp;amp;_Schwarz|Rohde &amp;amp; Schwartz]] is a German founded company specializes in electronic, they are founded in 1933 and they specifically  specialize in the fields of electronic test equipment, broadcast &amp;amp; media, cybersecurity, radiomonitoring and radiolocation, and radiocommunication.  &lt;br /&gt;
&lt;br /&gt;
Rohde &amp;amp; Schwartz has their headquarters in Munich in Germany, they also have  regional headquarters in the United States and in Asia.&lt;br /&gt;
&lt;br /&gt;
==Incidents==&lt;br /&gt;
===Refusal to allow usage of non company email addresses===&lt;br /&gt;
{{Main|link to the main article}}&lt;br /&gt;
Rohde &amp;amp; Schwarz refuse to allow usage of non company email addresses to download software update and documentation for their equipment.&amp;lt;ref&amp;gt;{{Cite web |last=Reps |first=Marco |title=Youtube Video: Beyond Scope. What else can R&amp;amp;S MXO4 do with Open Source Hard- &amp;amp; Software? |url=https://www.youtube.com/watch?v=UQKZS4z8P-w}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=EEVblog Forum post: Anyone noticed that Rohde &amp;amp; Schwarz is blocking firmware informations / updates? |url=https://www.eevblog.com/forum/testgear/anyone-noticed-that-rohde-schwarz-is-blocking-firmware-informations-updates/}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Kloosy goosy</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=File:Rohde_schwars_logo_Images.png&amp;diff=14902</id>
		<title>File:Rohde schwars logo Images.png</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=File:Rohde_schwars_logo_Images.png&amp;diff=14902"/>
		<updated>2025-06-02T22:08:02Z</updated>

		<summary type="html">&lt;p&gt;Kloosy goosy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kloosy goosy</name></author>
	</entry>
</feed>