My bad. I forgot to mention Step 0: Hard reset your router. That forces it to reflash from the ISP's servers (presuming they've fixed their source by now, which they have).
The remainder of the steps work to secure the router by removing the built-in security holes.
Provided that your router is furnished by your ISP. If it's one you bought yourself, then you may be out of luck.
Uh, er... What? That's the point of the article: The factory defaults were patched.
Patched, as in fixed? By whom? When? There are a plethora of (residential/small business) routers in service that haven't been updated since the day they were installed by the user (or at least since the last automatic factory furnished update was installed). Whatever flaws they had since then likely still exist. As a vendor's product line expands, support for older products tends to dry up. They can't keep up with everything; it costs too much. As long as a router still provides the service that the user is looking for, they're not prone to upgrade.
IT security in the U.S. is significantly more advanced than most of the rest of the world. The routers rented from Comcast and similar companies are updated on a routine basis.
In addition to your ISP's modem/WAP/router, you can isolate your home network using your own firewall/WAP/router between your ISP's modem and your network. Like you said, the default settings on ISP's modems (cable or DSL) leave a lot to be desired.
Consider finding an older or used router and using
one of these replacement router firmware. I've used the first two, DD-WRT and Tomato.
DD-WRT provides a great level of granularity, but unless you're have Cisco iOS training, it can be a bit daunting. Tomato, on the other hand, remains pretty powerful yet automates most functions.
Both of them are significantly more secure than your ISP's equipment.