Magspot Blogger Template

Exploit Firmware Router





Exploit Firmware Router

The router has more than 20 vulnerabilities. Yikes. "Following the consumer broadband industry's consistently lackadaisical attitude to security, the device suffers from everything from backdoor accounts to default credentials, leaky credentials, firmware upgrade vulns and insecure UPnP." The bugs were found by Pierre Kim, who has found other router bugs previously. The D-Link box is based on a Quanta LTE device which is the true source for some of the bugs. Five bugs are in the qmiweb webserver from Quanta. Examples: SSH and telnet are enabled by default, with two backdoor accounts (admin:admin, and root:1234). Most important points: it would be trivial to hack this router and add it to a botnet, and, D-Link blew Kim off when he tried to tell them about these problems.

This is a list of notable custom-firmware projects for wireless routers or software distributions for PC-based routers that have been created and are maintained by people and groups other than the manufacturer of the product. Many of these will run on various brands of Linux-based devices, such as Linksys, Asus, Netgear, etc. The extent of support for (and testing on) particular hardware varies from project to project. exploiting Firmware for router to easy




Previous Post Next Post

ads

ads

Post-ADS-2
Magspot Blogger Template

نموذج الاتصال