[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: FYI: Linksys router vulnerability



Josh Rehman wrote:

> It's interesting, the advisory claims that this can be exploited even
> when remote admin is disabled. I tried to break my own router with their
> advice, but it didn't work. (Maybe a kind soul has already cracked my
> router and updated my firmware for me? :-)
> 
> Presumably you can reset the password with this:
> http://192.168.1.1/Gozila.cgi?setPasswd=hola&RemoteManagement=1&.xml=1
> 
> (replace the ip with the ip of your router's local interface) but this
> didn't do nuttin for me...
> 
> That's good news. 
> 
> I think.

If that worked from the LAN side, it would be bad but not catastrophic.
If that worked from the WAN side, it would be catastrophic.

Of course, even from the LAN side, if someone can get into your system
through a forwarded port (say, cracking your web or mail server, or
getting into a shell via ssh), then it trivially becomes remotely
exploitable.

Craig

Attachment: pgpB9mE0ocgMb.pgp
Description: PGP signature


Reply to: