MacNN Forums (
-   Tech News (
-   -   Array of DSL networking hardware subject to escalating privileges hack (

NewsPoster Jan 3, 2014 12:08 AM
Array of DSL networking hardware subject to escalating privileges hack
Over the Christmas holiday, programmer <a href="" rel='nofollow'>Eloi Venderbeken</a> discovered a vulnerability in many Linksys, Netgear, and Belkin DSL modem/router combination devices, allowing an attacker who is on the network to escalate privileges or reboot an otherwise-secure router. The exploit seems to be limited to devices with <a href="[[Manuf::SerComm]]+[[Global+type::~embedded*]]&po=%3FFCC+ID%0D%0A%3FFCC+approval+date%3DFCC+date %0D%0A%3FEstimated+date+of+release%3DEst.+release+ date%0D%0A%3FEmbedded+system+type%0D%0A%3FCPU1+bra nd%0D%0A%3FCPU1+model%3DCPU1+mdl.%0D%0A&eq=yes&p[format]=broadtable&sort_num=&order_num=ASC&p[limit]=500&p[offset]=&p[link]=all&p[sort]=&p[headers]=show&p[mainlabel]=&p[intro]=&p[outro]=&p[searchlabel]=…+further+results&p[default]=&p[class]=sortable+wikitable+smwtable&eq=yes" rel='nofollow'>SerComm chipsets</a>, and has been confirmed to work on a wide array of both new and old models.<br />
<br />
TCP port 32764 is the target of <a href="" rel='nofollow'>the hack</a>, which still remains free of documentation from either Linksys or Netgear. After some testing, Vanderbecken gained access to a command line interface for the router, which allowed a script to be written granting him administrative access.<br />
<br />
The attack cannot be used outside a local area network's boundaries, and any attacker must be logged into the network to start, limiting the severity of the hack. Should the exploit become widely used, at most risk are businesses offering free Wi-Fi access or other establishments using off-the-shelf hardware for Internet access to a variety of anonymous patrons, like schools or libraries.
All times are GMT -4. The time now is 06:09 PM.

Copyright © 2005-2007 MacNN. All rights reserved.
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2017, vBulletin Solutions, Inc.

Content Relevant URLs by vBSEO 3.3.2