Wi-Fi routers vulnerable to remote hacking due to hard-coded admin credentials
A group of researchers have discovered that they could remotely log into some Wi-Fi routers using the hard-coded default administrator login. This yet unpatched security vulnerability can give attackers access to a few DSL, SOHO (small office / home office) WiFi routers using such default login scheme.
The group of researchers from the European University of Madrid had disclosed this vulnerability in May 2015 along with a few more other security vulnerabilities include privilege escalation, CSRF, XSS, DOS, authentication bypasses in other devices. According to an alert issued Tuesday by the CERT Coordination Center (CERT/CC) at Carnegie Mellon University, the affected device models are:
- ASUS DSL-N12E,
- DIGICOM DG-5524T,
- Observa Telecom RTA01N,
- Philippine Long Distance Telephone (PLDT) SpeedSurf 504AN and
- ZTE ZXV10 W300.
According to the researchers’ findings, all of these devices give administrative control over the router by using a hard-coded login scheme. Using the “admin” username for the Asus, DIGICOM, Observa Telecom, and ZTE devices, and the “adminpldt” for the Philippine Long Distance Telephone (PLDT) router, a hacker could easily authenticate himself on the WiFi stations using a common password.
The password scheme is “XXXXairocon” where XXXX represents the last four digits in the router’s MAC physical address, which usually is presented in consoles like six groups of two hexadecimal characters in the form of: “XX-XX-XX-XX-XX-XX“
Since getting hold of a router’s MAC is a trivial task for any technically skilled person, this would allow anyone to guess the admin passwords for those devices. Since the hard-coded password has the same format for all the mentioned devices, the firmware for all the above routers seems to manufactured by the same company.
|CWE-798: Use of Hard-coded Credentials
DSL routers, including the ASUS DSL-N12E, DIGICOM DG-5524T, Observa Telecom RTA01N, Philippine Long Distance Telephone (PLDT) SpeedSurf 504AN and Kasda KW58293, and ZTE ZXV10 W300 contain hard-coded credentials that are useable in the telnet service on the device. In the ASUS, DIGICOM, Observa Telecom, and ZTE devices, the username is “admin,” in the PLDT devices, the user name is “adminpldt,” and in all affected devices, the password is “XXXXairocon” where “XXXX” is the last four characters of the device’s MAC address. The MAC address may be obtainable over SNMP with community string public.
The vulnerability was previously disclosed in VU#228886 and assigned CVE-2014-0329 for ZTE ZXV10 W300, but it was not known at the time that the same vulnerability affected products published by other vendors. The Observa Telecom RTA01N was previously disclosed on the Full Disclosure mailing list.
|A remote attacker may utilize these credentials to gain administrator access to the device.|
|The CERT/CC is currently unaware of a practical solution to this problem and recommends the following workaround:|
Enable firewall rules so the telnet service of the device is not accessible to untrusted sources. Enable firewall rules that block SNMP on the device.
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|AsusTek Computer Inc.||Affected||04 May 2015||25 Aug 2015|
|DIGICOM (HK)||Affected||–||25 Aug 2015|
|Observa Telecom||Affected||–||25 Aug 2015|
|Philippine Long Distance Telephone||Affected||02 Jun 2015||27 Aug 2015|
|ZTE Corporation||Affected||03 Dec 2013||25 Aug 2015|
If you are a vendor and your product is affected, let us know.
CVSS Metrics (Learn More)
If you care about the security of your router, and you should, it is best to avoid consumer grade routers. On the whole, the software in these routers is buggy as heck. Below is what I base this opinion on. This list is far from complete.
You may be thinking that all software is buggy, but router software is probably worse. One reason for this is your ISP, which may have configured the router/gateway in an insecure way, either on purpose, to allow spying, or out of laziness or incompetence. Another reason is cost: router software is developed as cheaply as possible. Security is not the prime directive. Look the box a router ships in – none brag about security.
BIG BUGS. A number of flaws stand out. The port 32764 issue from January 2014 and April 2014 for example. A router backdoor was exposed, then instead of being removed, was just better hidden. Another flaw not to be missed is the Misfortune Cookie from December 2014. Some huge flaws do not yet get their full due here. WPS, for one. WPS is like having a “hack me” sign on your back and yet its required for a router to be certified by the Wi-Fi Alliance. Other huge flaws were the one with UPnP and the one involving USB file sharing.
Netgear Router Analytics means Netgear spies on your router
Netgear Enables User Data Collection Feature on Popular Router Model
by Catalin Cimpanu of Bleeping Computer May 22, 2017
News about this broke in May 2017, I’m late in writing it up. And, although this is not a software bug, it is a flaw nonetheless – one of corporate personality. Simply put, Netgear now spies on some of their routers. This rolled out in April 2017 with firmware 188.8.131.52 for the R7000. Also in April, spying/analytics was added to the Orbi RBK40, RBR40 and RBS40 (Firmware Version 184.108.40.206). In each case “data collection” is on by default, you have to login to the router to disable it. If you have a Netgear router, consider installing DD-WRT on it from the Netgear supported www.myopenrouter.com site.
- What is router analytics data collection for my NETGEAR router? from Netgear. Last Updated: May 23, 2017 Article ID: 000038665. They collect “certain technical data … to improve the experience with NETGEAR products”.
- What router analytics data is collected and how is the data being used by NETGEAR? from Netgear. Last Updated: May 23, 2017 Article ID: 000038663. The data collected includes: the router’s running status, number of connected devices, types of connections, LAN/WAN status, WiFi bands and channels, IP address, MAC address, serial number and similar technical data.
- Netgear ‘fixes’ router by adding phone-home features that record your IP and MAC address May 21, 2017 by Richard Chirgwin in The Register. Yeah, that’ll be secure for sure.
- Netgear firmware update collects your IP and MAC addresses by Dale Walker for IT PRO. May 22, 2017. Quoting: “In an email to IT Pro, Netgear said that the process of collecting data is ‘designed to improve the experience with NETGEAR products’, and that it ‘does not track or collect the websites you visit or collect the content of any traffic on your network.
- Privacy warning: Netgear routers copy Windows 10 and start ‘collecting analytics data’ by Mark Wycislik-Wilson for Beta News May 22, 2017
- Netgear Now Collects Router ‘Analytics Data’ – Here is How to Disable It May 21, 2017 Wang Wei The Hacker News
- Netgear NightHawk R7000 routers now collect user data by Ms. Smith in CSO Online May 22, 2017
- Netgear Adds Support For ‘Collecting Analytics Data’ To Popular R7000 Router at SlashDot May 21, 2017
Two bugs in an old TP-Link router
CVE-2017-9466: Why Is My Router Blinking Morse Code?
by Senrio June 19, 2017
Senrio has discovered two flaws in the TP-Link WR841N Version 8 router. The flaws, which can only be exploited on the LAN side, allowed them to not only gain administrative access to the device but also to run malicious code on it. The flaws were reported to TP-Link in Sept. 2016 and they were initially reluctant to fix an older product that was no longer supported. However, the fix was released in Feb. 2017. There was no update to the firmware for versions 9 and 11 of the router. It is not known if other TP-Link routers suffer from similar flaws. The first flaw was in a configuration service that allows attackers to send it commands without first logging in. The second flaw was a stack overflow issue and this is what let them install and run malicious software on the router.
- Flaws in common Wi-Fi Router set up Hotspot Hacks by Paul of The Security Ledger June 19, 2017
- Download for TL-WR841N V8 the TP-Link firmware download page
This is not news: the CIA targets many routers
CIA has been hacking into Wi-Fi routers for years, leaked documents show
by Zack Whittaker of ZDNet June 15, 2017
Secret documents, dated 2012 and leaked by WikiLeaks, reveal that the CIA has been targeting and compromising routers for years in an effort to carry out clandestine surveillance. One tool, known as CherryBlossom, allows the agency to monitor a target’s internet activity, redirect their browser and scan for information. The documents, which have not been verified, suggest this has been going on for years. CherryBlossom runs on 25 router models from 10 different manufacturers, and it’s likely that modifications would allow the implant to run on at least 100 more routers. Among the brands are Asus, Belkin, Buffalo, Dell, Dlink, Linksys, Motorola, Netgear, Senao and US Robotics.
- Advanced CIA firmware has been infecting Wi-Fi routers for years by Dan Goodin of Ars Technica June 15, 2017
- WikiLeaks Reveals How the CIA Could Hack Your Router by Andy Greenberg in Wired June 15, 2017. The headline is wrong, nothing was revealed about “how” to hack a router.
- CherryBlossom user guide from WikiLeaks. 175 page PDF
- CherryBlossom user guide at DocumentCloud.org
Multiple WiMAX routers are easily hacked
Ghosts from the past: Authentication bypass and OEM backdoors in WiMAX routers
by Stefan Viehbock of SEC Consult Vulnerability Lab June 7, 2017
WiMAX routers that make use of a custom httpd plugin for libmtk (the MediaTek SDK library) are vulnerable to an authentication bypass that allows a remote, unauthenticated attacker to change the administrator userid and password. The vulnerable software is commit2.cgi. It accepts a variable called ADMIN_PASSWD which is the new password. The full list of vulnerable routers is not known. Vendors making vulnerable routers include GreenPacket, Huawei, MADA, ZTE and ZyXEL. In addition, Viehbock believes the routers also contain backdoor accounts. The Huawei devices will not be fixed, the company said they are too old. The firmware was developed by ZyXEL which did not respond to inquiries made by CERT. After this got publicity, they responded to Chris Brook of Kaspersky’s Threatpost they are “working on a solution”. Time will tell.
- Vulnerability Note VU#350135 Various WiMAX routers contain an authentication bypass vulnerability in custom libmtk httpd plugin. by CERT June 7, 2017
- Authentication Bypass, Potential Backdoors Plague Old WiMAX Routers by Chris Brook of Threatpost June 8, 2017
- Various WiMAX CPEs Authentication Bypass an SEC Consult Vulnerability Lab Security Advisory June 7, 2017. This includes a proof of concept that sets both the administrator username and password.
7 bugs in web interface of Peplink routers
Multiple Vulnerabilities in peplink balance routers
by Eric Sesterhenn of X41 D-Sec GmbH June 5, 2017
Bugs have been reported in the web interface of Peplink Balance routers models 305, 380, 580, 710, 1350, 2500 running firmware 7.0.0. Initially it was not clear if other Balance routers were also vulnerable. They are. It was also not clear if other Peplink routers, such as the model, I recommend, the Surf SOHO are vulnerable. They are. And, it was not initially clear if the flaws are only in firmware 7.0.0 or if they also exist in the previous 6.3.3 firmware. They exist in both.
As to flaw details: (1) The worst is said to be a SQL injection attack via the bauth cookie parameter. This allows access to the SQLite session database containing user and session variables. (2) With specialized SQL queries, it is possible to retrieve usernames from the database. This doesn’t strike me as a big deal because Peplink lets you change the username. So, lots of guessing needed to exploit this. (3) The CGI scripts in the admin interface are not protected against cross site request forgery attacks. This allows an attacker to execute commands, if a logged in user visits a malicious website. (4) Passwords are stored in cleartext (5) If the web interface is accessible, it is possible to abuse the syncid parameter to trigger a cross-site-scripting issue. (6) If the web interface is accessible, it is possible to abuse the the orig_url parameter to trigger a cross-site-scripting issue in preview.cgi. (7) A logged in user can delete arbitrary files (8) If the web interface is accessible, it is possible to retrieve the router serial number without a valid login.
The report said that Peplink released updated firmware, version 7.0.1 to fix these bugs on June 5, 2017. However, on the 6th there was no mention of this firmware on the Peplink download page. In fact, there was no mention of these bugs anywhere on the Peplink site or in their forum. On the other hand, the reported timeline shows that Peplink responded quickly and fixed the bugs quickly. Running the admin interface on a non-standard port would likely have prevented abuse of these flaws. Also, devices in an isolated VLAN can be prevented from even seeing the router admin interface.
Peplink responded on June 7th in a forum posting on their website: 7.0.1 RC4 and 6.3.4 RC Addresses Security Advisory CVE-2017-8835 ~ 8840 This has links to updated firmware for all affected models. The new firmware is currently in Release Candidate status. It is expected to be upgraded to GA (Generally Available) status in a week. There are also a couple suggested work-arounds in case updating the firmware is not an immediate option.
3Gstore, a Peplink retailer that I have used a few times, sent an email to their customers about this which raised an excellent point that no one else had. There is a hidden danger to the fact that bad guys can learn the router serial number – they can register the router with Peplinks remote control service, InControl2 – if the router has not already been registered. So, 3Gstore suggests, that even if you are not using InControl 2, you should create an account and register your Peplink router for the sole purpose of preventing a bad guy from registering it. Routers registered with the InControl 2 service can be remotely controlled.
- X41 D-Sec GmbH Security Advisory: X41-2017-005 same text as above, just prettier.
- PEPLINK VULNERABILITIES by Eric Sesterhenn June 5, 2017. Details of the investigation.
- Peplink patches SD-WAN routers by Richard Chirgwin of The Register June 6, 2017
Multiple bugs in an old Cisco VPN router
Cisco drops critical security warning on VPN router, 3 high priority caveats
by Michael Cooney of Network World MAY 3, 2017
The Cisco CVR100W VPN router is old. It only does Wi-Fi N and it does not support Gigabit Ethernet. It has a critical bug in its Universal Plug-and-Play (UPnP) software which fails to do good range checking of UPnP input data. The bug could let an unauthenticated, Layer 2-adjacent attacker execute arbitrary code as root or cause a denial of service. Cisco has released new firmware with a fix. The same router also has vulnerability in the remote management access control list feature that could allow an unauthenticated, remote attacker to bypass the remote management ACL. No fix for this second flaw seems to be available.
- Cisco CVR100W Wireless-N VPN Router Universal Plug-and-Play Buffer Overflow Vulnerability from Cisco May 3, 2017. About the first bug.
- Cisco CVR100W Wireless-N VPN Router Remote Management Security Bypass Vulnerability from Cisco May 3, 2017. The second bug.
Bug in Cisco IOS XR routers
Cisco IOS XR Software Denial of Service Vulnerability
by Cisco May 3, 2017
The Event Management Service daemon of Cisco IOS XR routers improperly handles gRPC requests. This could allow an unauthenticated, remote attacker to crash the router in such a manner that manual intervention is required to recover. The gRPC service is not enabled by default. Cisco has released a bug fix.
Privacy issues with Trend Micro software in Asus routers
Review: ASUSWRT router firmware
by Daniel Aleksandersen of Ctrl.blog May 2, 2017
The stock firmware that runs Asus routers is called ASUSRWRT and it has a somewhat hidden privacy issue. If you use any of the following features, it will collect and transmit data about which websites you visit to Trend Micro: Apps/traffic Analysis, Bandwidth Monitor, Network Analyzer, Network Protection (AiProtection), Parental Controls (including time scheduling), Quality-of-Service, Web History and Network Map. This is spelled out in a EULA from Trend Micro. If the software thinks a website URL is potentially fraudulent, it sends the URL to Trend. In addition, executable files or content that is identified as potential malware is also send to Trend. Finally, email messages identified as spam or malware are sent to Trend, despite the fact that they may contain sensitive data. Quoting: “The EULA also contains language holding the router’s owner responsible for notifying their friends, family, and house guests who connect to the internet through the ASUS router that any network activity may be recorded and shared with Trend Micro.”
- The Asus RT-AC68U router – it’s fast but it also secure? by John E Dunn July 20, 2015. Quoting: “Owners might want to have a close look at the End User License Agreement (EULA) for this system, which is where privacy concerns rear their head …. Trend micro will have access to all websites and services visited while the software is enabled … This isn’t to criticise the router for offering this form of security simply to underline that it comes with a level of passive intrusion some might baulk at in other contexts. Equally, ISPs can collect exactly the same data if they choose so it’s important not to over-react.”
- Trend Micro End User License Agreement Undated
- How does AiProtection protect my home network? from Asus. Undated.
Flaw in modems using Intel’s Puma 6 chipset
You can blow Intel-powered broadband modems off the ‘net with a ‘trivial’ packet stream
by Shaun Nichols of The Register April 27, 2017
OK, its about modems, not routers. Close enough. A modem using Intel’s Puma 6 chipset can be overloaded and virtually knocked offline by a small amount of incoming data. There is no mitigation, but it does require a constant attack. When the attack stops, things return to normal. The bug has to do with exhausting an internal lookup table. Known vulnerable devices are the Arris SB6190 and the Netgear CM700. The Puma 6 chipset is also used in some ISP-branded cable modems, including some Xfinity boxes supplied by Comcast in the US and the latest Virgin Media hubs in the UK. Earlier articles mentioned a possible modem firmware update. However, even if a fix is issued you are at the mercy of your ISP to install it. Good luck with that.
- Intel’s buggy Puma 6 chipset earns Arris a gigabit-modem lawsuit by Shaun Nichols April 11, 2017
- SB6190 Puma6 TCP/UDP Network Latency Issue Discussion at DSL Reports
- SB6190 Puma6 TCP/UDP Network Latency Issue Discussion at DSL Reports
- Why your gigabit broadband lags like hell – blame Intel’s chipset by Chris Williams Dec. 3, 2016. Mentions other vulnerable devices: the Hitron CGNV4, and the Compal CH7465-LG. There are other brands, such as Linksys and Cisco, that use the system-on-chip that may also be affected.
Ten flaws in 25 Linksys routers
Linksys Smart Wi-Fi Vulnerabilities
by Tao Sauvage of IOActive April 20, 2017
Researchers discovered ten bugs, six of which can be exploited remotely by unauthenticated attackers. The bugs exist in four models of the WRT series and 21 models of the EAxxxx Series. Two of the bugs allow remote unauthenticated attackers to crash the router. Others leak sensitive information such as the WPS pin code, the firmware version, information about devices connected to the router and other configuration settings. The most serious bug requires authentication – it lets attackers execute shell commands with root privileges. In the worst case, this lets a bad guy setup a backdoor account on the router that would not appear in the web interface and could not be removed. If remote administration is enabled, the routers are vulnerable remotely. Either way, the routers are vulnerable from the LAN side. A big problem is that these routers have a default userid/password. Just that fact alone should steer you away from these routers. On the other hand, Linksys has co-operated well with IOActive in both acknowledging the problem and fixing it. Some of the buggy routers can self-update but that feature needs to be enabled.
- Flaws let attackers hijack multiple Linksys router models By Lucian Constantin April 20, 2017
- Linksys Security Advisory No date, of course. Linksys says to turn off Guest Wi-Fi networks.
More abuse of TR-069
Thousands of Hacked Home Routers are Attacking WordPress Sites
by Mark Maunder of Wordfence April 11, 2017
We have seen this story before. ISPs leave the TR-069 port, number 7547, open to the world at large rather than restricting access to themselves. Just more support for my recommendation to avoid using a router from an ISP. Wordfence reports that Shodan found over 41 million devices are listening on port 7547.
- Is Your Router Helping Criminals Attack Popular Websites? by Lee Mathews April 12, 2017
Travel routers from TP-LINK, StarTech, TripMate and TrendNet vulnerable
Travel Routers, NAS Devices Among Easily Hacked IoT Devices
by Chris Brook of Kaspersky ThreatPost April 10, 2017
Bugs in four travel routers were disclosed by Jan Hoersch of Securai GmbH in Munich. The TP-LINK M5250 will cough up administrator credentials in response to an SMS message. A StarTech router has telnet open with a hard coded password of root that can not be changed. On the Hootoo TripMate travel router an unathenticated user can do a firmware update. The TrendNet TEW714TRU used to let an unauthenticated LAN side user inject arbitrary commands. After the flaw was reported, TrendNet revised the firmware, but the underlying bug remained. Now, however, you have to be an authenticated user to exploit it.
- TP-Link 3G/Wi-Fi modem spills credentials to an evil text message by Richard Chirgwin April 10, 2017
Ubiquiti drags their heels fixing a bug
Unpatched vulnerability puts Ubiquiti networking products at risk
by Lucian Constantin of IDG News Service March 16, 2017
As bugs go, this is chump change; only authenticated users can exploit the flaw. The bug, discovered by SEC Consult, allows authenticated users to inject arbitrary commands into the web interface. The bug has been confirmed in 4 Ubiquiti Networks devices but is believed to exist in another 38. The worst part seems to the way Ubiquiti handled the issue. They acknowledged the flaw at the end of Nov. 2016, then gave SEC Consult a hard time and eventually just went silent. After a while, SEC Consult gave up and went public. Nerds everywhere love Ubiquiti, hopefully they read about this.
- SEC Consult Vulnerability Lab Security Advisory 20170316-0 Quoting: “SEC Consult recommends not to use this product in a production environment until a thorough security review has been performed by security professionals and all identified issues have been resolved.” Be sure to read the Vendor contact timeline.
Two bugs in GLi routers have been patched
by T Shiomitsu of Pentest partners Mar 13, 2017
- The full exploit code can be found here
Two bugs in old D-Link routers
D-Link DIR-130 and DIR-330 are vulnerable to authentication bypass and do not protect credentials
by Garret Wasserman of US-CERT March 15, 2017
Despite the article title, other D-Link models may be affected by these issues too. One bug allows a remote attacker that can access the remote management login page to manipulate the POST request to access some administrator-only pages without credentials. In addition, the tools_admin.asp page discloses the administrator password in base64 encoding. D-Link has confirmed the flaws, there is no information about if or when a patch will be issued. The devices are old. The DIR-330 is a Wi-Fi G VPN Firewall with Fast Ethernet. The DIR-130 is similar but without Wi-Fi. As usual, disable remote administration if not really needed. If it is needed, restrict the allowed source IP addresses. The bugs were discovered by James Edge.
- D-Link DIR-130 and DIR-330 routers vulnerable by Doug Olenick in SC Magazine March 16, 2017
D-Link again. HNAP again.
D-Link DIR-850L web admin interface contains a stack-based buffer overflow vulnerability
by Joel Land of US-CERT March 8, 2017
As bad as it gets: a remote, unauthenticated attacker can run arbitrary code as root. Yet another reason to disable remote administration. It is disabled by default on the DIR-850L device but, even then, the device can still be attacked from the LAN side. Other D-Link models may also be affected. The vulnerability is in the HNAP service. A bad guy can send a specially crafted POST request to http://routerIPaddress/HNAP1/ that causes a buffer overflow and execute arbitrary code. Beta firmware was released Feb. 17, 2017. The DIR-850L is a dual band Wi-Fi AC router. It is also affected by the November 2016 HNAP flaw in D-Link devices (see below). The bug was reported by Sergi Martinez of NCC Group.
Dealing with a hacked Netgear router
Router assimilated into the Borg, sends 3TB in 24 hours
by Chris Lee of Ars Technica February 26, 2017
Interesting story by someone who is not a networking expert. His Netgear R6400 router was hacked. The article goes into the symptoms of the problem and the debugging steps that he took to figure out the problem. After realizing the router had been hacked, a factory reset did not fix the problem which tells me that the router was running malicious firmware. DD-WRT was not much help. In the end, the router was a paperweight.
Bugs in two TP-Link routers
Updated Firmware Due for Serious TP-Link Router Vulnerabilities
by Michael Mimoso of Kaspersky Threatpost Feb. 13, 2017
One flaw allows for remote code execution but only after logging in to the router. Another flaw allows a bad guy to crash the TP-Link C2 and C20i routers. There are weak default credentials for the FTP server in the router. The default firewall rules are too permissive on the WAN interface. The final insult is artistic, Pierre Kim, who found the flaws, claims that three of the modules in the router firmware “are overall badly designed programs, executing tons of system() and running as root.” TP-Link plans to release a new firmware in February 2017, patching all the vulnerabilities. Perhaps the worst aspect was that when Kim first contacted TP-Link by livechat he was told “there is no process to handle security problems in TP-Link routers” and the company refused to offer a point of contact for security issues. Ouch.
- TP-Link C2 and C20i vulnerable to command injection (authenticated root RCE), DoS, improper firewall rules by Pierre Kim Feb. 9, 2017
- TP-Link C2 and C20i vulnerable to command injection (authenticated root RCE), DoS, improper firewall rules by Pierre Kim Feb. 9, 2017
Netgear routers buggy, yet again
CVE-2017-5521: Bypassing Authentication on NETGEAR Routers
By Simon Kenin of Trustwave January 30, 2017
There are two bugs in Netgear routers that leak the administrator userid and password. These are not to be confused with the two sets of bugs in Netgear routers last month. Each of these bugs can be exploited from the LAN side and, if remote administration is enabled, also from the WAN/Internet side of the router. Remote Administration should be disabled by default. Still, there are at least ten thousand vulnerable devices that are remotely accessible.The bugs were first reported to Netgear in April 2016 and, to date, all the affected routers have still not been patched. There is a work-around however, enable password recovery. This is an option in the router that requires a secret question before divulging the router password. With password recovery enabled, all is well. On some routers, you can test if it is vulnerable with
Getting patches issued was a long slog, obviously since it has taken 9 months. The first Netgear advisory listed 18 vulnerable devices. A second advisory listed an additional 25 models. As things stand now, there are 31 vulnerable models, 18 of which are patched. However, Trustwave warns that one of the models listed as not vulnerable (DGN2200v4) is, in fact, vulnerable. Ugh. Netgear now has a new procedure for handling reports about flaws in their software.
- Dozens of Netgear products vulnerable to authentication bypass flaws by Steve Ragan of CSO Jan. 30, 2017
- Trustwave SpiderLabs Security Advisory TWSL2017-003: Multiple Vulnerabilities in NETGEAR Routers by Simon Kenin Jan. 30, 2017. Contains a list of vulnerable Netgear and Lenovo routers
- Web GUI Password Recovery and Exposure Security Vulnerability from Netgear. Last Updated Jan. 27, 2017. Has updated firmware for many router models
- Trustwave Exposes Authentication Bypass Flaw In Netgear Routers by Nathaniel Mott of Toms Hardware Jan 30, 2017
Thailand ISP ignores router flaws
Router vulnerabilities disclosed in July remain unpatched
by Michael Mimoso of Kaspersky Threatpost January 17, 2017
The first sentence of this article is all you need to read: “Details on serious vulnerabilities in a number of routers freely distributed by a major Thai ISP were published on Monday after private disclosures made to the vendors in July went unanswered.” As I say elsewhere on this site, don’t use a router provided by your ISP. TrueOnline, the largest broadband company in Thailand, gives their customers three buggy routers: ZyXel P660HN-T v1, ZyXel P660HN-T v2 and Billion 5200 W-T. Multiple bugs (default admin accounts and command injection vulnerabilities) were found and disclosed by Pedro Ribeiro of Agile Information Security. Most of the vulnerabilities can be exploited remotely, some without authentication. It is likely that the same flaws exist in other ISP customized routers in other countries. A ZyXel representative told Threatpost the router models are no longer supported. Billion ignored a request for comment from Threatpost.
- SOHOpeless routers offer hard-coded credentials and command injection bugs by Richard Chirgwin Jan. 18, 2017
- Multiple RCE in ZyXEL / Billion / TrueOnline routers Full Disclosure mailing list. By Pedro Ribeiro Jan. 16, 2017
- SSD Advisory – ZyXEL / Billion Multiple Vulnerabilities SecuriTeam Secure Disclosure by Maor Schwartz Dec. 26, 2016
FTC accuses D-Link of poor security
Feds Accuse D-Link of Failing to Properly Secure Routers and Webcams
by Chris Morran of consumerist.org January 5, 2017
Federal regulators have accused D-Link of leaving its routers and webcam devices vulnerable to hackers. A lawsuit alleges that D-Link “failed to take reasonable steps to protect their routers and IP cameras from widely known and reasonably foreseeable risks of unauthorized access.” D-Link is also accused of misleading the public about the security of their devices. This is the second time the FTC has gone after insecure routers. In February 2016, they went after Asus for their insecure routers. At least Asus took their medicine, D-Link, in contrast, cried foul.
- The FTC lawsuit (PDF)
- D-Link case alleges inadequate Internet of Things security practices blog by Lesley Fair of the FTC Jan 5, 2017
- FTC Charges D-Link Put Consumers Privacy at Risk Due to the Inadequate Security of Its Computer Routers and Cameras Press release from the FTC Jan. 5, 2017
- D-Link Systems, Inc. Responds to FTC Complaint Defending Security Practices D-Link press release Jan 5, 2017
- FTC Sues D-Link For Pretending To Give A Damn About Hardware Security by Karl Bode of Techdirt Jan 13, 2017
- FTC: D-LINK FAILED TO SECURE ROUTERS, IP CAMERAS by Chris Brook of Kaspersky Threatpost Jan 5, 2017. This article puts the D-Link issues in perspective, noting a number of their other recent security failures.
- FTC sues D-Link for insecure routers and IP cameras by Lisa Vaas of Sophos Jan 9, 2017
Scam Android apps attack routers with default passwords
Switcher: Android joins the attack-the-router club
by Nikita Buchka of Kaspersky Labs December 28, 2016
As router attacks go, this is small potatoes. Victims have to install the scam Android apps manually, they are not in the Play store. And, it only impacts TP-Link routers with default passwords. The malware, dubbed Trojan.AndroidOS.Switcher changes the DNS servers in the router, something that can be detected, even though the author of this report fails to point this out (see the Tests page). Its only newsworthy as the first Android apps to attack routers. Still, it has infected 1,280 Wi-Fi networks in China.
- Switcher Android Malware Hacks TP-Link Routers, Changes DNS Settings by Catalin Cimpanu of Bleeping Computer Dec 28, 2016. Article includes the default admin credentials and mentions that currently the attack only works against TP-Link routers.
- Android trojan switcher infects routers via DNS hijacking by Chris Brook of Threatpost Dec. 28, 2016
Flaws in three ZyXEL routers are not being fixed
ZyXEL and Netgear Fail to Patch Seven Security Flaws Affecting Their Routers
by Catalin Cimpanu of BleepingComputer.com December 26, 2016
SecuriTeam documented four security flaws affecting three routers manufactured by ZyXEL. Don’t think you have a ZyXEL router? Look again, many companies put their own label on ZyXEL hardware. TrueOnline, a major ISP in Thailand providies ZyXEL routers to customers as do other ISPs. The known bad models are the P660HN-T v1, P660HN-T v2, and Billion 5200W-T. The routers are vulnerable to command injection on their web interface, which can be exploited by an unauthenticated attackers. Bad guys can thus take control of a router by issuing maliciously-crafted HTTP requests. It’s not clear if the vulnerability is on the LAN side, WAN side or both. In addition, the routers come with hard coded backdoor credentials. Ugh. ZyXEL was notified of the problems in July 2016 and chose to stonewall. Thus, there is no workaround or fix.
- SSD Advisory – ZyXEL Multiple Vulnerabilities by SecuriTeam December 26, 2016
- Multiple Vulnerabilities Impact ZyXEL Customized Routers by Ionut Arghire of Security Week December 27, 2016
Bug in the NETGEAR WNR2000
Stack buffer overflow vulnerability in NETGEAR WNR2000 router
by Pedro Ribeiro of Agile Information Security December 20, 2016
The Netgear WNR2000 router dates back to 2008. It does Wi-Fi “N” on the 2.4GHz band, period. It now sells for about $30. It has a remote code execution flaw that is exploitable over the LAN by default or over the WAN if remote administration is enabled. According to Shodan, about 10.000 of these routers have remote admin turned on. Ribeiro reverse engineered the internal uhttpd web server and found that function apply_noauth.cgi allows an unauthenticated user to perform admin functions. Some of the functions, such as rebooting the router, can be exploited straight away by an unauthenticated attacker. Other functions, such as changing Internet, WLAN settings or retrieving the administrative password, require the attacker to send a “timestamp” variable. But Ribeiro reverse engineered the timestamp generating function due to a flaw in its random number generation. Combining this flaw with some other information leakage, it is possible to recover the administrator password. A stack buffer overflow was also discovered. Bottom line: an unauthenticated attacker can take full control of the device. Ribeiro tried to contact Netgear three times (Sept 26th, Oct 28th and Nov. 29th) and never got a response. However, now that this got some coverage in the press, Netgear has responded and will fix the problems.
- Netgear: Nothing to see here, please disperse. Just another really bad router security hole by John Leyden Dec 23, 2016
- ZyXEL and Netgear Fail to Patch Seven Security Flaws Affecting Their Routers Catalin Cimpanu of BleepingComputer.com December 26, 2016
- RCE and admin credential disclosure in NETGEAR WNR2000 at Seclists by Pedro Ribeiro
- Insecure Remote Access and Command Execution Security Vulnerability, PSV-2016-0255 by Netgear Last Updated Dec. 24, 2016. “NETGEAR plans to release production firmware updates that fix the remote access and command execution vulnerability for all affected products as quickly as possible.” As of Dec 26, 2016 Netgear has released beta firmware.
DNS changing attack against MANY routers
Home Routers Under Attack via Malvertising on Windows, Android Devices
by Kafeine of Proofpoint December 13, 2016
Wow, this is bad. And made worse by being hard to detect and defend. Viewing a web page is all it takes to have a router attacked. The main goal of the malware is to change the DNS servers in the router. These server assignments normally propagate to all devices on a network. In some cases the malware also opens ports on the WAN side of the router leaving it vulnerable to other attacks. This malware was first seen 2015 when it exploited 55 known router flaws. This new improved version can exploit 166 known flaws, some of which work against several router models. If the malware can’t find a known bug for a router, it tries to logon to the router with default credentials. You do not have to visit a “bad” website, “the attack chain ensnares victim networks though legitimate web sites hosting malicious advertisements unknowingly distributed via legitimate ad agencies.” Which routers are vulnerable? The article says “It is not possible to provide a definitive list of affected routers.” That said, some routers were pointed out for being newly vulnerable: D-Link DSL-2740R, COMTREND ADSL Router CT-5367 C01_R12, NetGear WNDR3400v3 (and likely other models in this series), Pirelli ADSL2/2+ Wireless Router P.DGA4001N and Netgear R6200. Reading through the article, it’s obvious that the malware is very sophisticated. What to do? “Unfortunately, there is no simple way to protect against these attacks.” In a Dec. 19th update, Proofpoint wrote “At this time, a minimum of 56,000 routers have been compromised, but we expect that number is considerably higher.”
- Malvertising Campaign Infects Your Router Instead of Your Browser by Catalin Cimpanu December 14, 2016
- Malware delivered by bad ads takes over your home router to serve more bad ads (for now) by Cory Doctorow December 15, 2016
- Evolved DNSChanger malware slings evil ads at PCs, hijacks routers by Iain Thomson Dec. 20, 2016
Netgear router flaw affects 11 models
CERT Warns Users to Stop Using Two Netgear Router Models Due to Security Flaw
by Catalin Cimpanu of Bleeping Computer December 10, 2016
At least two Netgear routers, the R6400 and R7000 are vulnerable to a command injection flaw that is easy to exploit and could lead to total takeover of the routers. There has, as yet, been no response from Netgear. CERT has gone so far as to say “Users who have the option of doing so should strongly consider discontinuing use of affected devices until a fix is made available.” The documentation released so far does not make it clear if the devices are vulnerable on the LAN side only, WAN side only or both.
- Multiple Netgear routers are vulnerable to arbitrary command injection from CERT December 9, 2016
- Twitter user Acew0rm1 found the flaw
- Netgear Security Advisory for VU 582384
- Easily exploited Netgear router flaw discovered by me in Computerworld Dec. 10, 2016 and constantly updated afterwards
- Updates and more on the Netgear router vulnerability by me in Computerworld Dec. 17, 2016
- The Netgear router flaw post mortem — plenty of blame to go around by me in Computerworld Dec. 24, 2016
TR-064 protocol abused in new attack
Port 7547 SOAP Remote Code Execution Attack Against DSL Modems
by Johannes Ullrich of Sans November 28, 2016
Port 7547 is used by a remote management protocol known as either TR-069 or CWMP. It has been trouble before and I already suggest testing for it on the Tester Page. A ton of mistakes involved here. There was a TR-064 server available to the Internet at large on port 7547 which is two mistakes right there. TR-064 suffers from information disclosure issues. On some routers at least, its also buggy letting attackers run commands and totally take over the router. Finally, some routers hang when dealing with too many incoming connections which is what the malware did to spread. So even routers that were not infected, were knocked off-line. Oh, and the malare is a new variant of Mirai. According to Shodan, about 41 Million devices have port 7547 open. This attack is confirmation of my position to not use a router provided by your ISP.
- Eir’s D1000 Modem Is Wide Open To Being Hacked by kenzo2017 Nov. 7, 2016. Quoting “What is not very well known is that the server on port 7457 is also a TR-064 server. This is another protocol related to TR-069. It is also known as ‘LAN-Side CPE Configuration’. The idea behind this protocol is to allow the ISP to configure the modem from installation software supplied with the modem. The protocol is not supposed to be accessed from the WAN side of the modem but in the D1000 modem, we can send TR-064 commands to port 7547 on the WAN side … By sending certain TR-064 commands, we can instruct the modem to open port 80 on the firewall. This allows access the the web administration interface from the Internet facing side of the modem. The default login password for the D1000 is the Wi-Fi password. This is easily obtained with another TR-064 command.”
- Eir we go again: Irish ISP router flaw allows total takeover by Rene Millman of SCMagazineUK November 22, 2016
Quoting: “A security researcher has found a bug in a router used by Irish ISPs that could enable an attacker to gain full control of the modem from the internet … A spokesman for Zyxel told SCMagazineUK.com that Zyxel has sent a firmware patch to Eir to fix the bug and is currently waiting feedback from the ISP.”
- Deutsche Telekom statement: Information on current problems Nov. 28, 2016
- Newly discovered router flaw being hammered by in-the-wild attacks by Dan Goodin of Ars Technia Nov. 28, 2016
- TR-069 NewNTPServer Exploits: What we know so far by Johannes B. Ullrich, Ph.D. Nov. 29, 2016
- WERE 900K DEUTSCHE TELEKOM ROUTERS COMPROMISED BY MIRAI? by Comsecuris UG Nov. 29, 2016
- New Mirai Worm Knocks 900K Germans Offline by Brian Krebs Nov. 30, 2016
- On the Recent DSL Modem Vulnerabilities by Tod Beardsley and Bob Rudis of Rapid7 Nov. 30, 2016
- Blame the ISPs rather than the routers by me December 3, 2016
Yet another HNAP bug in D-Link routers
Turn off remote admin, SOHOpeless D-Link owners
by Richard Chirgwin of The Register November 8, 2016
Carnegie-Mellon Computer Emergency Response Team (CERT) reports a buffer overflow flaw in the HNAP service running on at least 8 D-Link routers. There is no fix from D-Link. The flaw can be exploited on the LAN side over port 80. The documentation is inconsistent as to whether it can also be exploited remotely. Known vulnerable models are the: DIR-823, DIR-822, DIR-818L(W), DIR-895L, DIR-890L, DIR-885L, DIR-880L and DIR-868L. However, D-Link markets these routers using alternate names such as the AC5300 Ultra Wi-Fi Router so you may need to map the external name to the internal model number. The flaw was discovered by Pedro Ribeiro of Agile Information Security back in July 2016. It’s not clear why it got no publicity until Nov. 7, 2016. D-link has a long history of vulnerabilities in their implementation of the HNAP protocol. CERT initially had no practical solution to this problem. On Nov. 10th, just days after this got publicity, D-Link issued the first round of patched firmware.
- Multiple vulnerabilities in Dlink DIR routers HNAP Login function (multiple routers affected). by Pedro Ribeiro of Agile Information Security. July 11, 2016. Original report. It warns that there might be other affected devices which are not listed above. And, it says “Dlink did not respond to CERT’s requests for information…” The same info is here.
- Vulnerability Note VU#677427 from CERT. DLink routers HNAP service contains stack-based buffer overflow. Nov. 7, 2016
- D-Link Systems, Inc. Information for VU#677427 DLink routers HNAP service contains stack-based buffer overflow. From CERT. No information here at all. Not sure what to make of it. Maybe its a placeholder warning as CERT tried to contact D-Link? Date Notified: Sept. 12, 2016. Date Updated: Oct 27, 2016
- Homeland Security Issues Alert on These Popular Routers by Marshall Honorof of Toms Guide Nov. 8, 2016
- Hacking D-Link Routers With HNAP by SourceSec Security Research. 2010
- dlink_hnap_login_bof.rb Metasploit Proof of Concept
- HNAP stack overflow :: DIR-8xx Routers Affected: All Models have Remote Admin Disabled as Default from D-Link November 10, 2016. They have issued new firmware for some of the vulnerable routers and firmware for other models is “Under Development.”
Still more attacks are changing DNS servers in routers
Cybercriminals target Brazilian routers with default credentials
by ESET October 21, 2016
Quoting: “Households and small businesses that use consumer-grade internet routers may fall victim to attacks that are currently targeting mainly Brazilian users, but may be easily localized to any other country. These attacks have been around since 2012, but the risks they carry are rising sharply … we are closely monitoring these attacks in order to keep pace with recent developments in the attackers’ techniques. It seems likely that there are different groups conducting these attacks … The main objectives of these attacks are to change the DNS configuration, allow remote management of the router by accessing it with its public IP, and to set a predefined password – often the router’s default password – for potential easy access for the perpetrators at a later time.”
These attacks can be defended against by not using the default router password and not using the default router IP address. Also, check your current DNS servers using dnsleaktest.com and/or whoer.net.
TheMoon malware version 2 adds attacks on more routers
TheMoon Botnet Still Alive and Well After Two Years
by Catalin Cimpanu October 20, 2016
TheMoon worm was discovered in early 2014 attacking vulnerable Linksys routers. In response, Linksys issued a firmware update. In response, the bad guy added an attack on vulnerable Asus routers. Sending malicious UDP data lets a bad guy execute malware on vulnerable Asus routers. And, the malware adds firewall rules to protect an infected router from other malware. One of these rules protects D-Link routers from an HNAP SOAP flaw so it is assumed the malware also targets D-Link routers.
- TheMoon – A P2P botnet targeting Home Routers by Bing Liu of Fortinet October 20, 2016
- Vulnerability: D-Link.Devices.HNAP.SOAPAction-Header.Command.Execution by Fortinet Last updated Dec 21, 2015
- CVE-2014-9583 The Asus router flaw in the infosvr service
Two stories about routers with default passwords
At least 15% of home routers are unsecured
by Peter Stancik of ESET October 19, 2016
ESET tested more than 12,000 home routers and found that 15% used weak passwords. It’s a matter of opinion as to whether this is good or bad news. They also found, not surprisingly, that “admin” was the userid in most cases. As for bugs, they found that 7% had “vulnerabilities of high or medium severity” and that 20% had Telnet open on the LAN side.
The very same day that ESET released its report, Brian Krebs wrote about a July 2015 conversation with someone who scanned the Internet for routers using default passwords, found over 250,000 of them and uploaded “some kind software to each vulnerable system.”
Bad guys frequently scan for router flaws
Home Routers – New Favorite of Cybercriminals in 2016
by Bing Liu of Fortinet October 12, 2016
Fortinet has been monitoring the outbreak of attacks targeting home routers. More and more scans are looking for known bugs in routers from D-Link, Asus and Netis. Back in August 2014, it was revealed that Netis routers have a hard coded password backdoor. Fortinet started looking for hacking attempts against this backdoor in July and there are many of them. A vulnerability that allowed Unauthenticated Remote Command Execution was discovered in D-Link routers back in 2013. Fortinet initially found very few bad guys trying to abuse this flaw, until this past summer when the hacking attempts went way up (two million in the last 30 days). The Asus flaw is puzzling. It was disclosed in Jan. 2015 and has to do with the infosvr service listening on UDP port 9999. The bug lets an unauthenticated LAN side device execute commands in the router as the root user. What’s puzzling is that the flaw was not supposed to be exploitable from the Internet. Yet, starting this past June, they saw a “surge in activity” trying to exploit it.
A D-Link router has miserable security and D-Link is slow to respond
D-Link DWR-932 B owner? Trash it, says security bug-hunter
by Richard Chirgwin of The Register September 29, 2016
The router has more than 20 vulnerabilities. Yikes. “Following the consumer broadband industry’s consistently lackadaisical attitude to security, the device suffers from everything from backdoor accounts to default credentials, leaky credentials, firmware upgrade vulns and insecure UPnP.” The bugs were found by Pierre Kim, who has found other router bugs previously. The D-Link box is based on a Quanta LTE device which is the true source for some of the bugs. Five bugs are in the qmiweb webserver from Quanta. Examples: SSH and telnet are enabled by default, with two backdoor accounts (admin:admin, and root:1234). Most important points: it would be trivial to hack this router and add it to a botnet, and, D-Link blew Kim off when he tried to tell them about these problems.
- Multiple vulnerabilities found in the Dlink DWR-932B (backdoor, backdoor accounts, weak WPS, RCE … by Pierre Kim. Sept. 28, 2016. Full details of the bugs and also the timeline, below is an excerpt:
Jun 15, 2016: Dlink is contacted about vulnerabilities in the DWR-932 router
Jun 16, 2016: Dlink Security Incident Response Team acknowledges the receipt of the report
Jul 9, 2016: Dlink says they will have correction by July 15
Jul 19, 2016: Pierre asks for updates.
Aug 19, 2016: Pierre asks for updates.
Sep 12, 2016: Pierre asks for updates
Sep 13, 2016: Dlinks says they don’t have a schedule for a firmware release
IoT insecurities – stick them in an isolated network
Hackers found 47 new vulnerabilities in 23 IoT devices at DEF CON
by Lucian Constantin of IDG News Service September 13, 2016
That IoT devices have poor security is not news. Only one of the 23 devices was a router. My take-away from this story is that IoT devices should be isolated as much as possible. We don’t want a compromised device to be able to do anything to any other device. For more on this see the Guest Network topic in my description of the Pepwave Surf SOHO router.
- IoT Village uncovers 47 security vulnerabilities across 23 devices by Mirko Zorz of Help Net Security Sept. 16, 2016
Inteno refuses to fix their buggy routers
ABBA-solutely crapulous! Swedish router-maker won’t patch gaping hole
by Iain Thomson of The Register September 2, 2016
Harry Sintonen of F-Secure found a vulnerability in some Inteno routers that lets a bad guy install their own firmware. The routers are managed by the ISP using a protocol called both TR-069 and CWMP (CPE WAN Management Protocol). Routers using this protocol phone home to an Auto Configuration Server (ACS) operated by the ISP. While the Inteno routers do use HTTPS, they do not validate the certificate they get from the ACS server. That means a bad guy, who can man-in-the-middle the connection, can feed the router hacked firmware. Inteno could care less, they blew the whole thing off. The good news is that since the ACS server should be in the internal network of the ISP, the flaw is hard to exploit. An attacker would need a privileged position on the ISP network.
- More IoT insecurity: the routers that take instructions from anyone by Paul Ducklin Sept. 5, 2016. Good article with this analogy: “That’s like having a stranger knock at your front door, asking them to show ID, being shown a the piece of paper with the word POLICE written on it in crayon, and then inviting them inside to take a look around.”
- Advisory by Harry Sintonen of F-Secure. The original source. It has defensive steps.
- Newfound Router Flaw Lets Hackers Control Home Internet Connections press release from F-Secure. September 2, 2016
This is why Router Security matters
IoT Home Router Botnet Leveraged in Large DDoS Attack
by Daniel Cid of Sucuri September 1, 2016
This is a blog post about a DDoS attack that Sucuri fought off for a client. The attack used three different botnets, one of them composed of routers. Sucuri detected over 11,000 compromised routers from eight different vendors. Quoting: “The largest number of routers being exploited came from Huawei-based routers. They varied between versions: HG8245H, HG658d, HG531, etc.” Other routers were from MikroTik, Ubiquiti, NuCom, Dell SonicWall, VodaFone, Netgear, and Cisco-IOS.
Multiple D-Link routers have a buffer overflow processing cookies
Vulnerability Note VU#332115 D-Link routers contain buffer overflow vulnerability
by CERT August 11, 2016
Quoting: “D-Link DIR routers contain a stack-based buffer overflow vulnerability, which may allow a remote attack to execute arbitrary code.” The overflow is in a function that validates the session cookie, it did not verify the length of the cookie properly. The flaw was first reported on May 31, 2016 and the first fixes were released Aug. 11, 2016. Some of the affected routers are the DIR-850L, DIR-890L, DIR-880L, DIR-868L and the DIR-818L. The bug can be exploited both locally and remotely. The worst of this, to me, is that the router exposes port 8181 on the Internet. A router should never need to leave ports open on the WAN side.
- CVE-2016-5681 – VU#332115 – Some D-Link routers are vulnerable to buffer overflow exploit by D-Link August 20, 2016. This has links to download the updated firmware.
- VulnTracker_advisory_DLink_RCE_vulnerability_CVE-2016-5681 by the NCC Group Aug. 11, 2016
BHU Networks router is terribly insecure
MULTIPLE VULNERABILITIES IDENTIFIED IN ‘UTTERLY BROKEN’ BHU ROUTERS
by Chris Brook of Kaspersky Threatpost August 19, 2016
- Multiple Vulnerabilities in BHU WiFi uRouter by Tao Sauvage August 17, 2016. The original source of the story.
Another high end vendor, Ruckus, found vulnerable
Ruckus Raucous: Finding Security Flaws in Enterprise-Class Hardware
by Craig Young of Tripwire August 3, 2016
I started this page to highlight bugs in consumer routers, yet the big boys are buggy too. At first, Young tested a Ruckus ZoneFlex. Quoting: “Within a few minutes of setting up the device, I found a command injection, which is exploitable through a forged request due to a general lack of CSRF tokens. As with many of the consumer routers I had tested, the ZoneFlex offers … a simple ping test, with apparently no input sanitization.” Consumer routers commonly have all processes running as root. Same with Ruckus. Young also found an Authentication Bypass: “All requests containing a particular string received ‘200 OK’ responses. By creatively adding this string to other requests, I was able to get response data intended only for authenticated queries. This is a behavior I have observed in routers from NETGEAR, TrendNET and Asus.” And, two other flaws: a Denial of Service and an Information Disclosure (the serial number is exposed). To me, the worst issue was that Young could not get in touch with Ruckus. This is a disgrace. My favorite router vendor, Peplink, has an online Forum where experts respond to questions and problems.
- Ruckus Routers Put Organizations at Risk, says Researcher by Michael Hill of Infosecurity Magazine Aug. 3, 2016
- Raucous Ruckus router ruckus roundly rumbles: Infosec bod says Wi-Fi kit is weak, biz says no by John Leyden of The Register Aug. 10, 2016
- Ruckus Wireless Security Advisory ID 080216 Vulnerabilities in WebGUI Interface on Ruckus Unmanaged APs by Ruckus Aug. 2, 2016.
“All Ruckus APs are vulnerable when the Web interface is accessible from external sources except unleashed product line … Ruckus will be actively working to close these vulnerabilities with high priority. Timelines for software release with these vulnerabilities fixed along with release details will be announced … ” They should also work on finding someone who speaks English and who knows this is 2016.
120 D-Link devices may be buggy, including routers
D-Link Wi-Fi Camera Flaw Extends to 120 Products
by Michael Mimoso of Kaspersky Threatpost July 7, 2016
“A software component that exposed D-Link Wi-Fi cameras to remote attacks is also used in more than 120 other products sold by the company. Researchers at Senrio, who found the original vulnerability, disclosed today additional details of product vulnerabilities related to the component after collaborating with D-Link. Senrio said the flaw also puts D-Link Connected Home products at risk, including other cameras, routers, models and storage devices.” There are no patches, yet. There are three flaws. The most severe is an unbounded/unchecked string copy that can be exploited to cause remote code execution.
- Home, Secure, Home? by Senrio June 8, 2016
- D-Link vulnerability impacts 400,000 devices by Steve Ragan of CSO July 7, 2016
- Regarding Senr.io Vulnerability Affecting Many D-Link Products response from D-Link. No creation date. No last updated date. Seven months after the initial problem report, this says “D-Link has not yet confirmed the list of models affected by this vulnerability.” and then this: “The first products will begin to get updates by July 19th and we will continue to update devices in the priority of numbers registered though the end of 2016.” Except not. Many devices are still said to be “pending as of Nov. 1, 2016.” I am writing this in Jan. 2017. D-Link either walked away from some devices or from their documentation.
TP-LINK lets domain lapse
TP-Link routers exposed to potential security flaw after domain registration lapses
by Boyd Chan Neowin July 4, 2016
One way that hardware vendors try to make the initial configuration of a router easier is by telling users to browse to a domain name rather than an IP address. TP-LINK uses both tplinklogin.net and tplinkwifi.net and they forgot to renew their ownership of tplinklogin.net. Its now owned by someone outside of the company and TP-LINK has, so far, refused to buy it back. This was discovered by Amitay Dan who also claims that TP-LINK is updating their documentation. I checked the TP-LINK website and found one item that says to use either an IP address or the domain they still own (tplinkwifi.net) and another item that says to use tplinklogin.net. Dan claimed that TP-LINK stopped talking to him after he brought this to their attention. If true, its a rare chance to see how much a company really cares about security. I blogged about this and did some testing. It is not a security issue for owners of TP-LINK routers. They intercept requests to tplinklogin.net and direct them to the router rather than the Internet. However, it could well be a problem for everyone else. I also found another domain that TP-LINK lost control of.
- Logic security flaw in TP-LINK – tplinklogin.net by Amitay Dan CEO at Cybermoon July 1, 2016
- TP-LINK lost control of two domains used to configure routers and Wi-Fi extenders by me July 4, 2016.
- Steve Gibson discussed this on his Security Now podcast on July 5, 2016. audio
- TP-LINK loses control of two device configuration domains by Zeljka Zorz of HelpNetSecurity July 5, 2016
- TP-Link forgets to register domain name, leaves config pages open to hijack by Peter Bright of Ars Technica July 6, 2016. Miserable article which includes this FALSE statement: “…subsequent visits to the configuration page can use the real Internet DNS system to resolve the address, and hence those routers are susceptible to being hijacked.” And, the author opted not to correct this when informed of the mistake.
Apple routers are buggy and Apple offers no details at all
Apple fixes serious flaw in AirPort wireless routers
by Lucian Constantin in PC World June 21, 2016
Apple has released firmware updates for its AirPort routers to fix a memory corruption bug stemming from DNS data parsing. Yet again, Apple deals with security problems by saying nothing. This tells me they can’t be trusted.
Quoting: “As is typical for Apple security announcements, the company did not release details about possible exploitation scenarios and did not assign a severity rating for the flaw … What is not clear is whether the data parsing issue is in the DNS server or DNS client functionality…. If the error is in the parsing of queries received from LAN computers, it would limit the attack to the local network. Whereas, if the flaw is in the parsing of DNS responses, it could be exploited remotely… Another unknown is the privilege with which attackers would execute malicious code if this flaw is successfully exploited. If the code is executed under the root account, it could lead to a full device compromise.”
It appears the bug was first known about back in September 2015. Pretty slow response. Apple routers do not self-update, installing the new firmware requires you to use either AirPort Utility 6.3.1 or later on OS X or AirPort Utility 1.3.1 or later on iOS. This means customers may have to update the AirPort utility before they can update the router.
- Apple keeps details of patched AirPort router vulnerability under wraps by Charlie Osborne for ZDNet June 21, 2016
- Apple AirPort routers get critical security update by Paul Ducklin June 21, 2016
- About AirPort base station firmware updates by Apple Last Modified Mar 6, 2015
- How to Get Apple’s Security Update for AirPort Routers by Henry T. Casey June 21, 2016
- About the security content of AirPort Base Station Firmware Update 7.6.7 and 7.7.7 by Apple Last Modified June 20, 2016. Not at all clear from reading this which Apple routers should be running firmware 7.6.7 and which should be running version 7.7.7.
Don’t hold your breath waiting for Cisco bug fixes
Cisco Won’t Patch Critical RV Wireless Router Vulnerability Until Q3
by Michael Mimoso of Kaspersky Threatpost June 16, 2016
The Cisco RV series of wireless VPN firewalls and routers have flaws in their web interface that allow for remote code execution. Workarounds are not available, yet Cisco plans on fixing this in the third quarter of 2016. To exploit the bug, just send the device a malicious HTTP request. If remote management is enabled, this can be exploited remotely. Effected models are the RV110W Wi-Fi VPN Firewall, RV130W Wi-Fi VPN Router and the RV215W Wi-Fi VPN Router. Not buggy enough? There are also cross-site scripting and buffer overflow bugs in the same devices.
- SOHOpeless Cisco wireless kit needs critical patch by Richard Chirgwin in The Register June 16, 2016
- Cisco RV110W, RV130W, and RV215W Routers Arbitrary Code Execution Vulnerability by Cisco June 15, 2016
- Cisco RV110W, RV130W, and RV215W Routers Cross-Site Scripting Vulnerability by Cisco June 15, 2016
- Cisco RV110W, RV130W, and RV215W Routers HTTP Request Buffer Overflow Vulnerability by Cisco June 15, 2016
MyD-Link devices are vulnerable
D-LINK patches weak crypto in MYD-LINK devices
by Michael Mimoso of Kaspersky Threatpost June 14, 2016
A couple flaws were found in My-DLink devices such as the DIR-810L cloud router. Other vulnerable devices include IP Cameras and home routers. One flaw is not verifying certificates after making an SSL connection, the other is using SSL v2 and SSL v3, both of which are known to haver security flaws. The flaws were found by Firmalyzer and D-Link released updated firmware. However, I looked for DIR-810L firmware on the D-Link website and could not find anything. The articles did not link to it either.
Update: a reader emailed me to point out that updated firmware is available for the B model of DIR-810L but not for the A model (see link below). The firmware is dated June 13th and marked as BETA.
- Mydlink-enabled devices are vulnerable to TLS MiTM by Firmalyzer June 13, 2016
- D-Link tech support for the DIR-810L
Netgear issues bug fixes
Netgear router update removes hardcoded crypto keys
by Michael Mimoso of Kaspersky Threatpost June 11, 2016
Netgear has released firmware updates for two of its router products lines, patching vulnerabilities that were reported in January. Models D6000 and D3600 are known to be vulnerable, but other models and firmware versions could also be susceptible to the same issues. One issue is an authentication bypass vulnerability, the other is a hard-coded cryptographic key. The devices are vulnerable to attack on the LAN side and remotely, if remote management is enabled. Abusing the flaws, an attacker can gain administrator access. A remote attacker able to access the /cgi-bin/passrec.asp password recovery page may be able to view the administrator password in clear text by examining the source code of the page. Two things are required to work around the problem: the password recovery feature must be enabled and remote management must be disabled. Netgear says “The potential for password exposure remains if you do not complete both steps. NETGEAR is not responsible for any consequences that could have been avoided by following the recommendations in this notification .. NETGEAR is working on a firmware fix and will email the download information to all registered users when the firmware becomes available. To register your product, visit https://my.netgear.com/register/ “
- Vulnerability Note VU#778696 Netgear D6000 and D3600 contain hard-coded cryptographic keys and are vulnerable to authentication bypass from US CERT June 11, 2016
- CVE-2015-8288 – Use of Hard-coded Cryptographic Key from Netgear Last updated June 15, 2016.
- CVE-2015-8289 – Authentication Bypass Using an Alternate Path or Channel from Negear. Last updated June 15, 2016
- Web GUI Password Recovery and Exposure Security Vulnerability from Netgear June 15, 2016. This lists about 20 routers that vulnerable along with a cable gateway device and 8 DSL gateways.
IPv6 Ping of Death hits Cisco and Junipter
Cisco warns IPv6 ping-of-death vuln is everyone’s problem
by Shaun Nichols of The Register June 2, 2016
Cisco devices running IOS XR, Cisco IOS, Cisco IOS XE and Cisco NX-OS software have a flaw in their processing of IPv6 Neighbor Discovery (ND) packets. Exploitation of this bug could cause high CPU usage, the suspension of processing all IPv6 traffic or the temporary loss of services for traffic that terminates on the device, in addition to IPv6 traffic. Cisco is working on fixes, but there is no timetable. Juniper has three bugs with IPv6 Neighbor Discovery processing in Junos OS.
- Juniper: Yes, IPv6 ping-of-death hits Junos OS, too by Richard Chirgwin in The Register June 8, 2016
- Cisco Products IPv6 Neighbor Discovery Crafted Packet Denial of Service Vulnerability by Cisco May 25, 2016
- IPv6 Neighbor Discovery Crafted Packet Denial of Service Vulnerability by Juniper June 3, 2016
Industrial company Moxa has buggy routers
Serious Vulnerabilities Found in Moxa Industrial Secure Routers
by Eduard Kovacs of Security Week May 19, 2016
Frankly, I had never heard of Moxa. The article calls them an “Industrial networking, computing and automation solutions provider” and says that their EDR-G903 series is an industrial router used in the United States, Europe and South America. Multiple high severity flaws, that can be exploited remotely, were discovered in January by Maxim Rupp. Configuration files store passwords in plain text. Both configuration and log files can be accessed with a specific URL by an unauthenticated attacker. A remote attacker can also cause the device to enter a DoS condition by sending it malicious requests. Patches have been issued, but they have not yet been verified to work.
Another business class company, Ubiquiti, has bugs
Worm infects unpatched Ubiquiti wireless devices
by Lucian Constantin of IDG News May 20, 2016
Quoting: “Routers and other wireless devices made by Ubiquiti Networks have recently been infected by a worm that exploits a year-old remote unauthorized access vulnerability. The attack highlights one of the major issues with router security: the fact that the vast majority of them do not have an auto update mechanism and that their owners hardly ever update them manually.” The bug has been fixed, but devices were not updated with patched firmware. The Resources page of this site lists routers that can self-update. Affected devices include the airMAX M Series, AirMAX AC, airOS 802.11G, ToughSwitch, airGateway and airFiber. The bug was easy to exploit. The latest worm creates a backdoor account, then adds a firewall rule that blocks legitimate administrators from accessing the Web-based management interface.
- Important Security Notice and airOS 5.6.5 Release by Ubiquiti May 16, 2016
- Foul-mouthed worm takes control of wireless ISPs around the globe by Dan Goodin May 19, 2016. ISPs in Argentina, Spain and Brazil have been infected.
26 bugs in Aruba Networks devices
Aruba fixes networking device flaws
by Lucian Constantin of IDG News Service May 9, 2016
The interesting part of this story is that all the bugs were found by Google. The last time I was in a Google office, I noticed that they use Aruba for their Wi-Fi. The vulnerabilities affect ArubaOS, Aruba’s AirWave Management Platform (AMP) and Aruba Instant (IAP). There 26 different issues range from privileged remote code execution to information disclosure, insecure updating mechanism and insecure storage of credentials and private keys. Under certain circumstances, attackers can compromise devices. There are also design flaws in an Aruba proprietary management and control protocol dubbed PAPI.
- Aruba Product Security Advisory ArubaOS PAPI Vulnerabilities from Aruba May 4, 2016
Malware changes router DNS settings
Mobile Devices Used to Execute DNS Malware Against Home Routers
by Chisato Rokumiya of Trend Micro April 11,2016
Quanta routers have every bug ever made
Multiple vulnerabilities found in Quanta LTE routers
by Pierre Kim April 4, 2016
Quoting: “Quanta Computer Incorporated is a Taiwan-based manufacturer of electronic hardware. It is the largest manufacturer of notebook computers in the world. The Quanta LTE QDH Router device is a LTE router / access point overall badly designed with a lot of vulnerabilities. It’s available in a number of countries to provide Internet with a LTE network.” Some of the bugs that Kim found: Hardcoded SSH Server key, Backdoor accounts, Router DoS, WebInterface Information Leak, two remote code execution flaws, two Backdoors, two flaws with WPS, Remote Firmware Over The Air, arbitrary file browsing and reading, etc. The buggy firmware seems to be used in many routers. My favorite part was Mr. Kims opinion: “… at best, the vulnerabilites are due to incompetence; at worst, it is a deliberate act of security sabotage from the vendor.” The company will not fix any of these bugs. As I say elsewhere on this site, avoid all consumer routers.
- Multiple Critical Vulnerabilities in Quanta Routers Won’t Be Patched by Chris Brook of Kaspersky Lab April 5, 2016
Arris cable modem issue
ARRIS (Motorola) SURFboard modem unauthenticated reboot flaw
by David Longenecker April 1, 2016
In a poor design decision, the Arris SB6141 cable modem can be rebooted and reset without requiring a password. This, combined with its having a dedicated IP address means that a malicious web page can knock you off-line, for a bit. This is not a bug or a flaw, that’s the way it was designed. The same flaw existed in the older SURFboard 5100 model at least as early as 2008 and it also exists in the 6121 model. Longenecker first reported the problem to Arris in January 2016 and he was ignored, until this got widely picked up in the press. When they were shamed into it, Arris changed the design. But, anyone with an effected modem is at the mercy of their ISP to install the update. It has been two months since Arris released new firmware, as I am writing this, and Time Warner has not yet rolled out the update. In fact, I was told by a Time Warner rep on the phone that its not their job to do so.
- Using a router to block a modem by me in Computerworld Feb. 23, 2015. I discuss how to block LAN access to the modem. Problem solved.
- Millions of Cable Modems Vulnerable to Easy Attack by Henry Casey of Toms Guide Apr 8, 2016
- Popular cable modem vulnerable to remote reboot/reset flaw by Darren Pauli of The Register April 11, 2016
- According to this May 8, 2016 report Comcast has updated modems on their network. The bad news is that instead of putting the reboot/reset functions behind password protection, they were totally disabled.
- Up to 13.5 million Arris modems vulnerable to reboot attacks by David Bisson of GrahamCluley.com April 8, 2016
- More than 135 million ARRIS cable modems vulnerable to remote attacks by Pierluigi Paganini of Security Affairs April 8, 2016. As far as I know the attacks are local, not remote. And the number of vulnerable modems is more like 13 million.
Telnet being abused by Remaiten bot
Your Linux-based home router could succumb to a new Telnet worm, Remaiten
by Lucian Constantin of IDG News Service March 31, 2016
Remaiten is a a new worm, discovered by ESET, that infects routers and other devices by taking advantage of weak Telnet passwords. The page on this site that lists services many/most people should turn off on their routers, includes Telnet. The software, also called KTN-Remastered, connects to random IP addresses on port 23. When a Telnet server is found, the software tries to login with assorted common passwords. The bot supports a variety of denial-of-service attacks. The Test Your Router page on this site links to assorted firewall testers that can tell you if your router has exposed a Telnet server.
- Meet Remaiten – a Linux bot on steroids targeting routers and potentially other IoT devices by Michal Malik and Marc-Etienne M.Leveille of ESET. March 30, 2016
Netgear router password flaw
Optus cable routers let anyone change passwords, says tech
by Darren Pauli of The Register March 17, 2016
There is a password flaw in the web interface of Netgear CG3000v2 gateways (combo router/modem/telephone adapter) provided by Australian ISP Optus. Specifically, the SetPassword.asp page, which prompts for the old and new password, ignores the old password and changes the password to the new one all the time. The flaw was discovered by Paul Szabo of the University of Sydney. When he informed both Netgear and Optus, they ignored him. Back in April 2014, this same Netgear box was the subject of another security flaw, it had both Telnet and SSH active with the same default password on every box. See Default password leaves tens of thousands of Optus cable subscribers at risk. Yet more proof not to use hardware provided by an ISP.
Modems can be buggy too
Cisco patches serious flaws in cable modems and home gateways
by Lucian Constantin of IDG News Service March 10, 2016
Quoting: “Cisco Systems has patched high-impact vulnerabilities in several of its cable modem and residential gateway devices … The embedded Web server in the Cisco Cable Modem with Digital Voice models DPC2203 and EPC2203 contains a buffer overflow vulnerability that can be exploited remotely without authentication … [the] Cisco DPC3941 Wireless Residential Gateway with Digital Voice and Cisco DPC3939B Wireless Residential Voice Gateway are affected by a vulnerability that could lead to information disclosure [by] an unauthenticated, remote attacker … The Cisco Model DPQ3925 8×4 DOCSIS 3.0 Wireless Residential Gateway with EDVA is affected by a separate vulnerability … that could lead to a denial-of-service condition.”
- Cisco Cable Modem with Digital Voice Remote Code Execution Vulnerability March 9, 2016
- Cisco Wireless Residential Gateway with EDVA Denial of Service Vulnerability March 9, 2016
A ton of new router flaws discovered
New firmware analysis framework finds serious flaws in Netgear and D-Link devices
by Lucian Constantin of IDG News Service Feb 29, 2016
Been there done that. Once again, a group of researchers looked at many router firmwares and found a ton of bugs. The bug hunting was done with a framework called FIRMADYNE built by Daming Chen, Maverick Woo and David Brumley from Carnegie Mellon University and Manuel Egele from Boston University. They found 887 firmware images that were vulnerable to at least one of 74 known exploits. They also found 14 previously unknown vulnerabilities in 69 firmware images used by 12 products. The Web management interface of six Netgear devices (WN604, WN802Tv2, WNAP210, WNAP320, WNDAP350 and WNDAP360) contain several pages that can be accessed without authentication and could allow attackers to pass input directly to the command line. In addition, the Netgear WN604, WNAP210, WNAP320, WND930, WNDAP350 and WNDAP360 also include Web pages that can be accessed without authentication and they expose the WPS PIN code. WPS bad. As for D-Link, the web server used in the D-Link DAP-2310, DAP-2330, DAP-2360, DAP-2553, DAP-2660, DAP-2690 and DAP-2695 have a buffer overflow vulnerability that can be triggered when processing a cookie. And, more. Six other devices (the D-Link DAP-1353, DAP-2553 and DAP-3520 and the Netgear WNAP320, WNDAP350 and WNDAP360) expose wireless passwords and admin credentials over SNMP. Perhaps the most important issue here is that D-Link never responded to the researchers reporting these bugs. Netgear will have fixes out by mid March.
- FIRMADYNE is an automated system for performing emulation and dynamic analysis of Linux-based embedded firmware.
- D-Link, Netgear Router Vulnerabiltiies by Dominic Chen Feb 24, 2016
- Towards Automated Dynamic Analysis for Linux-based Embedded Firmware (PDF)
FTC goes after ASUS routers for bad security
ASUS Settles FTC Charges That Insecure Home Routers and “Cloud” Services Put Consumers’ Privacy At Risk
by the FTC February 23, 2016
The security of ASUS routers was flawed in many ways. What seems to have brought the U.S. Government down on them were the flaws with the security of storage devices plugged into a USB port in the router. The two features are called AiCloud and AiDisk. The bugs are listed on the bugs page of this site. The password protection was easy to bypass, so much so, that good guys would leave messages for people warning that their router was easily hacked. All this while ASUS was bragging about how secure this was. Manuals suggested that users all use the same userid and password. The FTC claims that ASUS did not take reasonable steps to secure the software on their routers. Then too, the usual behavior from consumer router companies: ignoring reports of bad security for months on end and even when updated firmware is finally made available, the router incorrectly reports that there is no available update. ASUS agreed to pay a fine and to security audits every two years. In summary, more proof to my argument that all consumer routers should be avoided.
- Asus lawsuit puts entire industry on notice over shoddy router security by Dan Goodin of Ars Technica. Feb. 23, 2016
- FTC Settles Deception and Unfairness Charges Against ASUS Over Router Security by Samuel Edwards in the National Law Review Feb. 26, 2016
- ASUSTeK Computer Inc., In the Matter of from the FTC. Feb. 23,2016. This is an index of multiple documents related to this case.
- FTC And Asus Settle Router Security Case by Tom Spring of Kaspersky Feb. 24, 2016
A warning about configuring Asus routers
Poor UX leads to poorly secured SoHo routers
by David Longenecker blogging at Security For Real People Feb. 7, 2016
Asus routers with an RT in the model name suffer from a user interface design flaw. If the firewall is disabled, remote administration (which Asus calls “Web Access from WAN”) is enabled, even if remote administration is specifically disabled by the user. That is, the firewall setting over-rides the remote admin setting and nothing about this is externalized to the end user. Longenecker stumbled across this by accident while checking his public IP address in Shodan. He found over 135,000 Asus wireless routers that can be logged into from the Internet. I take this as yet another reason to always change the remote admin port number, even if you have disabled remote administration.
- Bad UI Design Sabotages Security of ASUS SoHo Routers by Catalin Cimpanu for Softpedia Feb 12, 2016
Building router hacked
Building automation systems are so bad IBM hacked one for free
by Darren Pauli of The Register Feb 11, 2016
Quoting: “An IBM-led penetration testing team has thoroughly owned an enterprise building management network in a free assessment designed to publicise the horrid state of embedded device security … they found exposed administration ports … gaining access to a D-Link panel enabled to allow remote monitoring … by adding an extra carriage return after the page request it was possible to bypass the router’s authentication. They found command injection vulnerabilities in the router and found a list of commands in the firmware source code. They found a cleartext password in the router’s var directory that not only granted more router pwnage but, thanks to password-reuse, allowed them to compromise the building management system.” No mention of who made the router, let alone a model number.
- Penetration testing a building automation system (PDF) by IBM X-Force Research Feb. 2016
Two issues in Cambium Networks ePMP1000 router
CARISIRT: Defaulting on our Passwords (pt.2): Attacker-Friendly Security
by Zachary Wikholm of CARI.net Feb. 5, 2016
SNMP is enabled by default and the default configuration has community strings “public” and “private” for read and write respectively. This allows a remote attacker to potentially reboot the device using the SNMP write community. There are also multiple default userids and passwords and SSH is enabled by default. Default user/pswd admin/admin is allowed unrestricted access via SSH. Three additional userid/password pairs are installer/installer (an admin), home/home (readonly) and read-only/read-only (also readonly).
Two issues in Ubiquiti AirOS and EdgeMax routers
CARISIRT: Defaulting on our Passwords (pt.2): Attacker-Friendly Security
by Zachary Wikholm of CARI.net Feb. 5, 2016
Mostly quoting: All current products have the default userid/password of ubnt/ubnt and have SSH enabled by default. The ubnt user also has sudo access via sudo -s. This gives remote attackers the ability to make changes … This is very well known to attackers, and Ubiquiti devices make for a great target as they can support SOCKS proxying, and a wide variety of malware.
Mostly quoting: When an AirOS device switches back to factory defaults, it copies the /usr/etc/system.cfg to /tmp/system.cfg; saves and then reboots. An attacker … can thus make changes to this default configuration to maintain persistence on a device … current versions of the EdgeMax EdgeOS store the factory default configuration as well as other configurations in /opt/vyatta/etc/. An attacker can modify these configs, thus maintaining persistence across factory resets. Also, it would very easy for a remote attacker to reset the device to defaults.
Mikrotik RouterOS default passwords
CARISIRT: Defaulting on our Passwords (pt.2): Attacker-Friendly Security
by Zachary Wikholm of CARI.net Feb. 5, 2016
Mostly quoting: A long standing problem in the Mikrotik RouterOS is the default username and password. All versions including the 6.34 release have default user of “admin” with no password … many devices are compromised within the first few hours of being put on line. During our tests, a device with the username “admin” and no password was compromised within 15 minutes and had 9 unique pieces of malware running within 20 minutes … also allows SSH access without a password.
Default TP-LINK router password needs only 70 guesses
The Wi-Fi router with a password that takes just 70 guesses
by Paul Ducklin of Sophos January 27, 2016
Some TP-LINK routers have unique default passwords. But the passwords require, at most, 70 guesses. Most of the password is based on the publicly advertised MAC address of the router. The remaining byte has, in theory, 256 possible values, but some detective work showed where this byte comes from and it has only 70 possible values. Not the first time something like has happened. Never use the default router password.
- Spot the #zeroday in your TL-WR702N routers. Do you even test your #infosec? Original source. Tweet by Mark C. @LargeCardinal
Another attack on the HNAP protocol
Threat Group Uses Dating Sites to Build a Botnet of Vulnerable Home Routers
by Catalin Cimpanu of Softpedia Jan. 21, 2016
Some dating websites are spreading a worm to their visitors, infecting their routers and adding it to a botnet. The worm is a new variant of TheMoon, which was first discovered in February 2014. It takes advantage of weaknesses in the Home Network Administration Protocol (HNAP). An iframe checks to see if the router supports HNAP. If so, it calls home, informing its creators of the good news. Then a second URL delivers the worm, which is a Linux ELF binary. The worm prevents users from using some inbound ports, and opens outbound ports through which it spreads to other routers. If you take the advice offered here, you would be safe from this because it only looks for the usual suspects regarding the routers IP address.
- Threat Actors Use Sketchy Dating Website to Launch New Home Router Attacks by Damballa, the original source of the story. January 20, 2016
Asus routers may never log you off
Administrator logout flaw in ASUS wireless routers
by David Longenecker blogging at Security for Real Peple January 19, 2016
A hard coded SSH password found in Fortinet devices
Et tu, Fortinet? Hard-coded password raises new backdoor eavesdropping fears
by Dan Goodin of Ars Technica Jan 12, 2016
The hard coded SSH password was FGTAbc11*xy+Qqz27 and it was active in 2013 and 2014. Fortinet says it is not a backdoor writing: “This issue was resolved and a patch was made available in July 2014 as part of Fortinets commitment to ensuring the quality and integrity of our codebase. This was not a ‘backdoor’ vulnerability issue but rather a management authentication issue.” In response, the top promoted comment at Ars says: “So they’re saying there was no malice, just an astounding level of incompetence in the area in which they are supposed to be experts?”. Fortinet said nothing to their customers when they disabled the password in 2014. And, it appears they never removed it. Ars was told by a researcher that the password is still in the firmware.
- Fortinet tries to explain weird SSH ‘backdoor’ discovered in firewalls by Iain Thomson of The Register Jan. 12, 2016. Quoting: “It appears Fortinet’s engineers implemented their own method of authentication … and the mechanism ultimately uses a secret passphrase. This code was reverse-engineered by persons unknown, and a Python script to exploit the hole emerged on the Full Disclosure mailing list this week. Anyone who uses this script against vulnerable firewalls will gain administrator-level command-line access to the equipment.”
- Multiple Products SSH Undocumented Login Vulnerability Security advisory from FortiGuard Jan. 12, 2016
- Brief Statement Regarding Issues Found with FortiOS by Fortinet January 12, 2016
- SSH Issue Update by Fortinet January 20, 2016. The same issue was found in more of their stuff. Quoting “… we discovered the same vulnerability issue on some versions of FortiSwitch, FortiAnalyzer and FortiCache. These versions have the same management authentication issue that was disclosed in legacy versions of FortiOS … this vulnerability is an unintentional consequence of a feature that was designed with the intent of providing seamless access from an authorized FortiManager to registered FortiGate devices.” I take “seamless” to mean “easy” and good security is never easy, so it strikes me as a design flaw.
FRITZ!Box vulnerable on the LAN side but fixes are available
FRITZ!Box home broadband routers’ security FRITZed
by Richard Chirgwin of The Register Jan. 12, 2016
FRITZ!Box routers are popular in Germany and Australia. German security company RedTeam Pentesting found that program dsl_control listens for commands on TCP port 8080 on the LAN side. They then found that with the right SOAP request the program offers up a list of the commands that it supports, and, that it will execute these commands without authorization. Come and get it, open to all. Perhaps technically, this is not remotely exploitable, but LAN side attacks can be executed from malicious web pages loaded by a LAN side device. The flaw lets a bad guy gain root access. The bug was found in Feb. 2015 but was not made public to give the vendor time to create and distribute a fix. FRITZ!Box routers can self-update and new firmware is available. All told, well handled by everyone involved.
- AVM FRITZ!Box: Remote Code Execution via Buffer Overflow The original source. Jan. 7, 2016
Thanks to Walter Mostosi for reporting the issue affecting ASUS devices, Naresh LamGarde for DIGICOM devices, and to Eskie Cirrus James Maquilang for PLDT devices. Thanks again to Cesar Neira for reporting the issue in ZTE devices, and to Jose Antonio Rodriguez Garcia for disclosing the Observa Telecom vulnerability to Full Disclosure. Thanks to all security researchers who has contributed their research regarding the hard coded credentials on DSL Consumer routers.
I am the collector of this information not the original writer.