By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Safaricom fixes router flaw that let users access home fibre for free
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Safaricom fixes router flaw that let users access home fibre for free
Computing

Safaricom fixes router flaw that let users access home fibre for free

News Room
Last updated: 2025/07/16 at 2:31 AM
News Room Published 16 July 2025
Share
SHARE

Safaricom has fixed a long-standing technical loophole in its Home Fibre network that allowed thousands of customers to access internet service for free or at a heavily discounted rate. The issue dates back to at least 2018 and was only fully resolved in 2024.

The flaw, which insiders say cost the company tens of millions of shillings in lost revenue, exposed critical weaknesses in Safaricom’s broadband infrastructure when the telco was expanding rapidly. It also raises questions about internal controls, especially as Safaricom cements its dominance in Kenya’s fixed internet market.

The loophole stemmed from weak router authentication protocols on Safaricom’s fixed broadband network, two engineers familiar with the matter told . The system used Point-to-Point Protocol over Ethernet (PPPoE), which required both a username and a password. But while usernames were unique to each user, a single, generic password was accepted across the board.

“People would often use someone’s account number as the username and apply the general password,” said one of the engineers who spoke on condition of anonymity.

Safaricom did not respond to a request for comment.

The workaround was quietly exploited by users and, in some cases, aided by Safaricom’s outsourced sales agents. When a subscription lapsed, customers could pay agents—sometimes as little as KES 1,000 ($8)—to reset the router and input new credentials. This would restore service without any official payment to Safaricom, bypassing the full monthly charges that typically range between KES 2,999 ($23) and KES 20,000 ($155).

“It became common in certain areas,” another engineer added. “The router would be reset, and someone with access to credentials would get the customer back online without Safaricom ever getting paid.”

Because the system only allowed one session per account, this workaround worked best with unused or expired accounts, many of which were hijacked without the knowledge of legitimate users. In other cases, users were knowingly complicit in the scheme. Internally, the Safaricom fibre team knew about the abuse, but the vulnerability proved difficult to resolve quickly. Parts of the system relied on legacy infrastructure from the telco’s early fibre deployment days, and fixes would have required deep changes across the network backend. 

“This wasn’t something you could patch with one update,” said the engineer.

The issue persisted for years as Safaricom rapidly scaled its fixed broadband business, adding thousands of new connections monthly. But by 2024, Safaricom implemented long-overdue changes: unique, complex passwords were enforced for every account, and session restrictions were tightened to ensure that no more than one connection per account could be active at a time. It 

“If one were to somehow get hold of the username and password, they would still not be able to use it as only one session is allowed,” the engineer said. 

While Safaricom has not disclosed the exact revenue loss, internal estimates suggest that the loophole cost the company tens of millions of Kenyan shillings—probably more, over several years. Insiders say the losses could have been far greater had the vulnerability not been quietly managed and eventually resolved.

According to the latest regulator data, Safaricom controls 36.5% of Kenya’s fixed internet market and serves 678,118 customers, making it the country’s largest internet service provider.

Mark your calendars! Moonshot by is back in Lagos on October 15–16! Join Africa’s top founders, creatives & tech leaders for 2 days of keynotes, mixers & future-forward ideas. Early bird tickets now 20% off—don’t snooze! moonshot..com

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The Studio on Apple TV+ just beat a record previously held by Ted Lasso
Next Article Save $90 on the GoPro Hero12 Black at Amazon
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Glo’s 3.2 million subscriber loss opens door for 9mobile comeback
Computing
How can the UK reform the energy grid to meet AI needs? – UKTN
News
Financial Agility: The Secret to Managing Your Money on Your Terms
Gadget
Why I love my Apple EarPods
News

You Might also Like

Computing

Glo’s 3.2 million subscriber loss opens door for 9mobile comeback

8 Min Read
Computing

How a Three-Phase Detector Identifies Smart Contract Vulnerabilities | HackerNoon

3 Min Read
Computing

AI Agents Act Like Employees With Root Access—Here’s How to Regain Control

5 Min Read
Computing

Critical Golden dMSA Attack in Windows Server 2025 Enables Cross-Domain Attacks and Persistent Access

6 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?