Corporate travelers should be warned that a Wi-Fi router commonly used in hotels is easily compromised, putting guests passwords at risk and opening up their computers to malware infections and direct attacks.The good news is that there is a patch for the flaw, but there is no guarantee affected hotels will install it right away.+ More on Network World: 10 young security companies to watch in 2015 +Cylance, a security vendor whose research team found the problem, says 277 InnGate routers in 29 countries are affected. The routers are made by ANTLabs. Cylance map of where the vulnerable InnGate routers are located.Cylance researchers wouldn\u2019t say which hotels were using the devices. \u201cListing those vulnerable devices at this time would be irresponsible and could result in a compromise of those networks,\u201d says the Cylance SPEAR team blog. \u201cTake it from us that this issue affects hotels brands all up and down the spectrum of cost, from places we've never heard of to places that cost more per night than most apartments cost to rent for a month.\u201dThe vulnerability could also affect the hotels themselves if attackers are able to compromise the router then move to other parts of the hotel network, SPEAR says, potentially affecting reservations and billing.\u201cANTLabs InnGate devices are a popular Internet gateway for visitor-based networks. They\u2019re commonly installed in hotels, convention centers and other places that provide temporary guests access to a WiFi connection. If you\u2019ve ever used WiFi in a hotel, you\u2019re familiar with these types of devices as they are typically tied to a specific room number for billing purposes,\u201d the blog says.The flaw, called CVE-2015-0932, gives read and write access to the file system of the routers. \u201cRemote access is obtained through an unauthenticated rsync daemon running on TCP 873. Once the attacker has connected to the rsync daemon, they are then able to read and write to the file system of the Linux based operating system without restriction,\u201d according to the blog.Once access is gained to the file system, it\u2019s trivial to execute remote code on the machine, it says.