The HG532e was famously targeted by variants of the Mirai botnet (like Satori), which turned these routers into "zombies" for launching DDoS attacks.

This is the most significant vulnerability associated with the HG532 series. Attackers can exploit the TR-064 protocol (used for remote management) to inject malicious commands and take full control of the router.

Updating the firmware is a critical maintenance task for users of this older wireless gateway . While the device was a staple for many Internet Service Providers (ISPs), it has been subject to several high-profile security vulnerabilities that can only be "fixed" or mitigated through proper software management. Why You Must Update: Key Fixes and Vulnerabilities