Please note that for the purpose of describing this exploit, your router is considered vulnerable if the external site can use DNS rebinding to open a connection to your router. Note that once the connection to your router is open, the bad guys on the other end must still "break" the router or the router password to actually exploit it.
And if your router has open vulnerabilities, is unpatched, and/or is still set to the default password, this particular exploit is utterly moot - you are ALREADY at tremendous risk from a remote control trojan, of which there are PLENTY in the wild.
Don't let the fact that your router isn't listed on his list for this exploit give you a false sense of security that it's not exploitable - or necessarily freak out if it is. But do keep it's firmware up to date and change the password from the default to a strong password at the earliest possible stage in the initial setup of the router, and change it periodically after that, regardless.
<S>