what about this post about "Shellshocking OpenVPN servers":
https://news.ycombinator.com/item?id=8385332
it says: "OpenVPN servers are vulnerable to Shellshock under certain configurations. OpenVPN has a number of configuration options that can call custom commands during different stages of the tunnel session. Many of these commands are called with environmental variables set, some of which can be controlled by the client. One option used for username+password authentication is "auth-user-pass-verify". If the called script uses a vulnerable shell, the client simply delivers the exploit and payload by setting the username. This attack vector is pre-auth."
does that mean using OpenVPN server with username+password auth on my RT-N66U is dangerous?