Not seen anything about this in here yet, so thought I'd try and get some discussion going on.
Source: http://blog.thesysadmins.co.uk/wifi-protected-setup-wps-vulnerability.html
This seems to be pretty big when you consider that a lot of ISPs in the UK ship routers with WPS enabled by default. On the link there is a Google Doc that is being compiled of devices that are known to be vulnerable - but with this being a flaw with WPS itself.. I think it's safer to assume that a device vulnerable until proven otherwise.
Wi-Fi protected set-up (WPS) was designed to ease the task of joining clients to a wireless network. The user simply types an 8 digit numeric pin, which transparently gives the user the WPA/WPA2 PSK and allows them to join the wireless network. So far so good.
...
There are 8 digits in the pin, the 8th being a checksum of digits 1-7. So with 7 digits left, it then gets interesting: during a WPS negotiation attempt, the system acknowledges when the first 4 digits of the PIN are correct. So we try up to 10^4 keys first, then 10^3 keys plus the checksum. There are around 11,000 keys/PINs to be attempted, but because of how the exploit works, searching half of the key space first, on average the number of keys that are probably tried before the right one is found is around half that. That small number means the key space can be tested in a relatively small amount of time, typically somewhere between 4 and 10 hours.
Source: http://blog.thesysadmins.co.uk/wifi-protected-setup-wps-vulnerability.html
This seems to be pretty big when you consider that a lot of ISPs in the UK ship routers with WPS enabled by default. On the link there is a Google Doc that is being compiled of devices that are known to be vulnerable - but with this being a flaw with WPS itself.. I think it's safer to assume that a device vulnerable until proven otherwise.