Page 2 of 2 FirstFirst 12
Results 17 to 19 of 19

Thread: News - Easy to exploit backdoor found in several D-Link router models

  1. #17
    Admin (Ret'd)
    Join Date
    Jul 2003
    Posts
    18,481
    Thanks
    1,016
    Thanked
    3,208 times in 2,281 posts

    Re: News - Easy to exploit backdoor found in several D-Link router models

    Quote Originally Posted by DanceswithUnix View Post
    Firstly, respect for your airgap. I just couldn't do that, I simply keep that stuff in paper form in filing cabinets. Moving on...


    Even not seeking a back door, some companies seem to introduce them.

    The previous router I used at home opened an SSH port for admin use. Nice. Now this just gets you some simple proprietary admin commands in a captive command line interface, so I'm sure someone thought it was secure. First command I typed was "ps". Thinking it looked rather linux like, the next command I typed was "px ;/bin/sh" and lo and behold I have a root command line and total access to the internals of the router. I sure hope that is usually disabled on the WAN port, though in my case it was overridden anyway.

    It's sad when you have to harden these devices yourself, but sadly that's the world we live in, despite the development processes existing to very much reduce the risk of these things happening.
    My old router had an (IIRC) telnet port that bypassed all login checks and gave full admin access, including to password change routines. Damn good job, too, when I lost the note I'd written the login password on, and then forgotten it.

    BUT .... it was only accessible via a direct cable connection on an RS232 port on the modem, and I had to solder up a custom cable, even then, because none of my 'standard' ones were wired right for it. Not that anything much was 'standard' on some of those RS232 cables. Now THAT is a half-decent (security wise) precaution .... you can override any an all settings, but only if, first, you know how, and second, have physical access to the router.


    What still makes me nervous about this DLink story is what else might other makes have buried in their firmware and, so far, hidden from view?

  2. #18
    root Member DanceswithUnix's Avatar
    Join Date
    Jan 2006
    Location
    In the middle of a core dump
    Posts
    12,986
    Thanks
    781
    Thanked
    1,588 times in 1,343 posts
    • DanceswithUnix's system
      • Motherboard:
      • Asus X470-PRO
      • CPU:
      • 5900X
      • Memory:
      • 32GB 3200MHz ECC
      • Storage:
      • 2TB Linux, 2TB Games (Win 10)
      • Graphics card(s):
      • Asus Strix RX Vega 56
      • PSU:
      • 650W Corsair TX
      • Case:
      • Antec 300
      • Operating System:
      • Fedora 39 + Win 10 Pro 64 (yuk)
      • Monitor(s):
      • Benq XL2730Z 1440p + Iiyama 27" 1440p
      • Internet:
      • Zen 900Mb/900Mb (CityFibre FttP)

    Re: News - Easy to exploit backdoor found in several D-Link router models

    Quote Originally Posted by Saracen View Post
    What still makes me nervous about this DLink story is what else might other makes have buried in their firmware and, so far, hidden from view?
    Oh I expect all of them have faults, including the open source guys, hopefully not as stupid and obvious as this.

    Hence if you care you should run *two* firewalls, and they must be different so whatever vulnerability gets through the first one doesn't help with the second.

  3. #19
    Comfortably Numb directhex's Avatar
    Join Date
    Jul 2003
    Location
    /dev/urandom
    Posts
    17,074
    Thanks
    228
    Thanked
    1,027 times in 678 posts
    • directhex's system
      • Motherboard:
      • Asus ROG Strix B550-I Gaming
      • CPU:
      • Ryzen 5900x
      • Memory:
      • 64GB G.Skill Trident Z RGB
      • Storage:
      • 2TB Seagate Firecuda 520
      • Graphics card(s):
      • EVGA GeForce RTX 3080 XC3 Ultra
      • PSU:
      • EVGA SuperNOVA 850W G3
      • Case:
      • NZXT H210i
      • Operating System:
      • Ubuntu 20.04, Windows 10
      • Monitor(s):
      • LG 34GN850
      • Internet:
      • FIOS

    Re: News - Easy to exploit backdoor found in several D-Link router models

    Quote Originally Posted by Saracen View Post
    But more worryingly, if Dlink have such a security breach in their firmware, then either it was deliberate and authorised, or control over code is pretty poor, and that is inexcusable in a product like this.
    Embedded systems people are utterly utterly utterly utterly utterly utterly utterly utterly utterly utterly utterly utterly utterly utterly incompetent.

    This will be low-bid-contractor idiocy, not malice.

    Someone was implementing a means for OEM-rebranded routers to be remotely updated (e.g. Sky and BT routers receive firmware updates remotely), and did it in the worst way possible.

Page 2 of 2 FirstFirst 12

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •