Users with infected routers can remove the unsafe Stage 2 and Stage 3 components of VPNFilter by rebooting the device. Users are also advised to upgrade the device's firmware and to select a new secure password.
The F.B.I. has issued a warning, asking the owners of hundreds of thousands of Internet routers to reboot the device to prevent Russian malware. Rebooting will disable the malware only temporarily, but that's OK: The bureau has seized a key web domain connected with the attack and will be able to detect the IP address of routers that hackers are attempting to re-infect.
They say Russian hackers have compromised hundreds of thousands of private home devices in an effort to get into networks and see data.
The malware could possibly collect information, exploit the device, block network traffic and render the routers inoperable. The Department of Homeland Security simply says the size and scope of the malware infection is "significant". "The initial infection vector for this malware is now unknown". "Detection and analysis of the malware's network activity is complicated by its use of encryption and misattributable networks".
So far, the routers affected were manufactured by Linksys, Mikrotik, Netgear, QNAP and TP-Link.
The FBI suggests that you consider disabling your router's remote management features.
Breaking the connection though, is basically what you need to do, and the FBI's action in seizing the server spreading the malware means that your routers won't be reinfected once you reboot.