**EDIT** Thank you to everyone that reached out, I am in contact with the appropriate people at Bell now thanks to you guys. I'm an IT professional and Bell Aliant Fibe customer in Newfoundland, Canada. During security testing on my own Bell HomeHub 3000 (Sagemcom FAST 5566), I discovered multiple critical vulnerabilities in a remote management service that Bell forces to remain internet-facing on every HomeHub 3000 router. Key findings (without exploitation details): - A single attacker from one endpoint can crash the entire network for all connected devices. Not just the management interface, full internet outage for every device on the network. Confirmed during testing on my own equipment. - Zero rate limiting, zero connection throttling, zero IP banning. Unlimited requests accepted indefinitely. - Customers cannot disable the service. Bell support does not understand the issue and cannot help. - Approximately 1.24 million Bell routers in Canada have this service exposed (confirmed via multiple public api and tools like Censys public scan data). - Additional findings include missing security headers, weak password hashing, and absence of brute force protection. I have filed a formal complaint with the CRTC and contacted Bell's information security team ([cni-nic@bell.ca](mailto:cni-nic@bell.ca)). I have a comprehensive technical assessment documented with full reproduction steps available for responsible disclosure. If anyone has a direct contact within Bell's network security or product security team, I would appreciate the connection. Bell's frontline support (tech, loyalty, fraud departments) were unable to escalate appropriately. I am not sharing exploitation details publicly. This post is a warning to Bell Fibe customers and a request for help reaching the right people at Bell. CRTC response expected within 10 business days (filed April 25, 2026).   submitted by   /u/sargetun123 [link]   [comments]