×

Loading...
Ad by
  • 推荐 OXIO 加拿大高速网络,最低月费仅$40. 使用推荐码 RCR37MB 可获得一个月的免费服务
Ad by
  • 推荐 OXIO 加拿大高速网络,最低月费仅$40. 使用推荐码 RCR37MB 可获得一个月的免费服务

后门总是会被发现的, 不知道新的口令是什么

本文发表在 rolia.net 枫下论坛KHAMSIN Security News
KSN Reference: 2004-06-03 0001 TIP
---------------------------------------------------------------------------

Title
-----
The Netgear WG602 Accesspoint contains an undocumented
administrative account.

Date
----
2004-06-03


Description
-----------

The webinterface which is reachable from both interfaces (LAN/WLAN)
contains an undocumented administrative account which cannot be disabled.

Any user logging in with the username "super" and the password "5777364"
is in complete control of the device.

This vulnerability can be exploited by any person which is able to reach
the webinterface of the device with a webbrowser.

A search on Google revealed that "5777364" is actually the phonenumber
of z-com Taiwan which develops and offers WLAN equipment for its OEM
customers.

Currently it is unknown whether other Vendors are shipping products
based on z-com OEM designs.


Systems Affected
----------------

Vulnerable (verified)
WG602 with Firmware Version 1.04.0

Possibly vulnerable (not verified)
WG602 with other Firmware Versions
WG602v2
All other z-com derived WLAN Accesspoints


Proof of concept
----------------

Download the WG602 Version 1.5.67 firmware from Netgear
( http://kbserver.netgear.com/support_details.asp?dnldID=366 )
and run the following shell commands on a UNIX box:

$ dd if=wg602_1.5.67_firmware.img bs=1 skip=425716 > rd.img.gz
$ zcat rd.img.gz | strings | grep -A5 -B5 5777364

Which results in the following output:

%08lx:%08lx:%s
%08lx%08lx%08lx%08lx
Authorization
BASIC
super <---- Username
5777364 <---- Password
%02x
Content-length
HTTP_USER_AGENT
HTTP_ACCEPT
SERVER_PROTOCOL

Disclaimer
----------

This advisory does not claim to be complete or to be usable for
any purpose. Especially information on the vulnerable systems may
be inaccurate or wrong. Possibly supplied exploit code is not to
be used for malicious purposes, but for educational purposes only.
This advisory is free for open distribution in unmodified form.

http://www.khamsin.ch

---------------------------------------------------------------
KHAMSIN Security GmbH Zuercherstr. 204 / CH-9014 St. Gallen
http://www.khamsin.ch
---------------------------------------------------------------更多精彩文章及讨论,请光临枫下论坛 rolia.net
Report

Replies, comments and Discussions:

  • 工作学习 / IT杂谈 / 这个比较有趣,NetGear WG602 无线路由器被人发现有后门,可以用一个特殊的口令一admin方式登陆上去,而不管你现在的设置是什么。于是,NetGear发布了一个补丁,号称解决了这个问题。事实是:NetGear只是换了一个口令。
    • 后门总是会被发现的, 不知道新的口令是什么
      本文发表在 rolia.net 枫下论坛KHAMSIN Security News
      KSN Reference: 2004-06-03 0001 TIP
      ---------------------------------------------------------------------------

      Title
      -----
      The Netgear WG602 Accesspoint contains an undocumented
      administrative account.

      Date
      ----
      2004-06-03


      Description
      -----------

      The webinterface which is reachable from both interfaces (LAN/WLAN)
      contains an undocumented administrative account which cannot be disabled.

      Any user logging in with the username "super" and the password "5777364"
      is in complete control of the device.

      This vulnerability can be exploited by any person which is able to reach
      the webinterface of the device with a webbrowser.

      A search on Google revealed that "5777364" is actually the phonenumber
      of z-com Taiwan which develops and offers WLAN equipment for its OEM
      customers.

      Currently it is unknown whether other Vendors are shipping products
      based on z-com OEM designs.


      Systems Affected
      ----------------

      Vulnerable (verified)
      WG602 with Firmware Version 1.04.0

      Possibly vulnerable (not verified)
      WG602 with other Firmware Versions
      WG602v2
      All other z-com derived WLAN Accesspoints


      Proof of concept
      ----------------

      Download the WG602 Version 1.5.67 firmware from Netgear
      ( http://kbserver.netgear.com/support_details.asp?dnldID=366 )
      and run the following shell commands on a UNIX box:

      $ dd if=wg602_1.5.67_firmware.img bs=1 skip=425716 > rd.img.gz
      $ zcat rd.img.gz | strings | grep -A5 -B5 5777364

      Which results in the following output:

      %08lx:%08lx:%s
      %08lx%08lx%08lx%08lx
      Authorization
      BASIC
      super <---- Username
      5777364 <---- Password
      %02x
      Content-length
      HTTP_USER_AGENT
      HTTP_ACCEPT
      SERVER_PROTOCOL

      Disclaimer
      ----------

      This advisory does not claim to be complete or to be usable for
      any purpose. Especially information on the vulnerable systems may
      be inaccurate or wrong. Possibly supplied exploit code is not to
      be used for malicious purposes, but for educational purposes only.
      This advisory is free for open distribution in unmodified form.

      http://www.khamsin.ch

      ---------------------------------------------------------------
      KHAMSIN Security GmbH Zuercherstr. 204 / CH-9014 St. Gallen
      http://www.khamsin.ch
      ---------------------------------------------------------------更多精彩文章及讨论,请光临枫下论坛 rolia.net
      • They replaced the old user name 'super' with 'superman', and changed the old password to '21241036'. "