That's why you should use a firewall
Exploits running on routers - either Cisco IOS or ROS are nothing new. You could allow access to legitimate ports, which could have 0-day exploits allowing RCE.I dare you to run some code on RouterOS that can listen on some port.
But I didn't get the firewall part you wrote above, if your firewall blocks everything, how can anything else you've said be valid (having some service listening, bypassing the firewall), example, please. Because I can't sleep tonight knowing that my firewall does nothing.
Burying one's head in sand is not a good security posture. Firewall rules do not guarantee lack of possible exploits through legitimate traffic. I do not see a valid reason for not having a command showing ports that are listening for traffic, given this proprietary software runs on top of open source kernel that has facilities to provide such information. It's not like Mikrotik built the whole thing from scratch. No one does it these days. Even Cisco's monolithic legacy IOS has open source bits and pieces compiled into it.
if you don't trust this platform please use another or build your own like you want
MikroTik is not open source is a commercial product
But..... Really???Post the IP address of your router. I'll then tell you which ports are open.
BECAUSE SAID DEVICE HAS CAPABILITIES TO BLOCK LISTENING PORTS OUT OF THE BOX.It is beyond me why people defend the lack of a basic command to show listening ports on a device which has kernel capabilities to expose it out of the box.
Ok, this is the best answer of the month, which I prefer...BECAUSE SAID DEVICE HAS CAPABILITIES TO BLOCK LISTENING PORTS OUT OF THE BOX.It is beyond me why people defend the lack of a basic command to show listening ports on a device which has kernel capabilities to expose it out of the box.