Exploit Firmware Router


Exploit Firmware Router


The router has more than 20 vulnerabilities. Yikes. "Following the consumer broadband industry's consistently lackadaisical attitude to security, the device suffers from everything from backdoor accounts to default credentials, leaky credentials, firmware upgrade vulns and insecure UPnP." The bugs were found by Pierre Kim, who has found other router bugs previously. The D-Link box is based on a Quanta LTE device which is the true source for some of the bugs. Five bugs are in the qmiweb webserver from Quanta. Examples: SSH and telnet are enabled by default, with two backdoor accounts (admin:admin, and root:1234). Most important points: it would be trivial to hack this router and add it to a botnet, and, D-Link blew Kim off when he tried to tell them about these problems.



This is a list of notable custom-firmware projects for wireless routers or software distributions for PC-based routers that have been created and are maintained by people and groups other than the manufacturer of the product. Many of these will run on various brands of Linux-based devices, such as Linksys, Asus, Netgear, etc. The extent of support for (and testing on) particular hardware varies from project to project. exploiting Firmware for router to easy



Share this

Related Posts

Previous
Next Post »