I can confirm that several colleagues in the sector are reporting the same issue: their PPPoE servers started multiplying client sessions, exhausting the IP pools and causing service outages for users. The routers I have been able to review are properly secured, with no management ports exposed to the Internet. In all cases, the affected versions belong to the 6.x series.
I have sent the following email to support@mikrotik.com, but I am not very optimistic about receiving a response:
”Dear MikroTik Support Team,
I work as a consultant and ISP specializing in MikroTik environments. I would like to bring to your attention an incident we recently encountered which, due to its characteristics, we believe warrants further analysis.
During the early hours of the morning, around 03:00 AM, between Tuesday and Wednesday, several ISP networks across Spain began experiencing unusual behavior in their routers. These infrastructures are completely independent from one another, with no operational or network relationship, which makes the situation particularly striking.
In all cases, the affected devices were MikroTik routers running the latest stable release of the v6 branch. Suddenly, multiple additional PPPoE sessions started to appear. These sessions were not replacing existing ones; instead, they accumulated progressively, eventually exhausting the available IP address pools within each network.
It is important to note that all environments were properly secured. No inbound access was allowed, either due to strict firewall rules or because the routers were located behind upstream NAT devices with no open ports. In other words, only outbound traffic was permitted.
The only effective way to restore normal operation was to reboot the affected devices. Due to the direct impact on customer connectivity — as these are ISPs serving a significant number of subscribers — immediate action was required, which unfortunately prevented us from collecting more detailed diagnostic data. No supout.rif files were generated, and the available logs were not useful, as the logging buffer quickly became saturated with connection-related errors.
Additionally, after discussing this issue with other professionals in the sector here in Spain, we have confirmed that they have experienced the same problem in their own networks.
The fact that this behavior occurred almost simultaneously across completely independent networks leads us to suspect a possible software-related issue or an external triggering factor.
We would greatly appreciate your insight on whether similar incidents have been reported, as well as any recommendations you may have for preventing such situations or improving data collection should the issue occur again.
Please let me know if you require any additional technical details.
Thank you very much for your support”