lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 13 Aug 2004 12:22:46 +0200 From: "Andre Lorbach" <alorbach@....adiscon.com> To: <thanasonic@...k.gr>, <bugtraq@...urityfocus.com> Subject: RE: NETGEAR DG834G SPECIAL FEATURES > -----Original Message----- > From: thanasonic@...k.gr [mailto:thanasonic@...k.gr] > > By opening http://192.168.0.1/setup.cgi?todo=debug you enable > the router's debug mode.Then you just telnet at 192.168.0.1 > at port 23 and then you have a root shell. > > Also i found that if you just telnet to 192.168.0.1 2602 you > will get a prompt from the service ZEBRA that is running on > the router.By giving "zebra" as password *which is the > default password* you got also a root shell. Wow! That's exactly the router I have and these exploits work *fear*. Fortunately, only on the local network, but they work! With what Firmware version did you test? I still have 1.04 here. Best regards, Andre Lorbach
Powered by blists - more mailing lists