Anything that has a web-based admin/configuration that can be done remotely (i.e., outside of the LAN) is technically vulnerable, and almost all of these devices are no matter how current the firmware is. The fact that we're behind a double-NAT on this network isolates us a lot from those trying to probe via IPv4, which is the most common.
Most of my morning routine is going through an access log subset that includes just direct-IP probes, login attempts (and there are a lot of those), and the full set of webDAV (port 81) attempts. Why webDAV is even allowed these days is beyond me. In fact there's a bunch of apps out there with embedded malware that just probe webDAV access in various forms.
I've not seen any IPv6 probing on a large scale, because of the resources required to scan the full range of IPv6 IPs, but I suppose that's coming at some point.