[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <40BBA138.5070406@mattcaron.net>
Date: Mon, 31 May 2004 17:18:48 -0400
From: Matthew Caron <matt@...tcaron.net>
To: "Alan W. Rateliff, II" <lists@...eliff.net>
Cc: bugtraq@...urityfocus.com
Subject: Re: LinkSys WRT54G administration page availble to WAN
Isn't that the Linksys product that runs Linux and all these folks have
been making custom firmware for? If so, can't one of those folks fix
this bug if Linksys it taking too long?
Alan W. Rateliff, II wrote:
> Manufacturer: LinkSys (a division of Cisco)
> Product: Wireless-G Broadband Router
> Model: WRT54G
> Product Page:
> http://www.linksys.com/products/product.asp?grid=33&scid=35&prid=601
> Firmware tested: v2.02.7
>
> In a recent client installation I discovered that even if the remote
> administration function is turned off, the WRT54G provides the
> administration web page to ports 80 and 443 on the WAN. The implications
> are obvious: out of the box the unit gives full access to its administration
> from the WAN using the default or, if the user even bothered to change it,
> an easily guessed password.
>
> I reported this to LinkSys (along with a number of other non-security
> related issues) on April 28. I received no reponse addressing this, and no
> updated firmware has yet appeared on their firmware page
> http://www.linksys.com/download/firmware.asp?fwid=201
>
> To work around this, you can use the port forwarding (irritatingly renamed
> to Games and whatever) to send ports 80 and 443 to non-existant hosts. Note
> that forwarding the ports to any hosts -- inluding listening ones if you are
> actually running servers -- will override the default behavior.
>
> On a personal note, there are a number of reasons for which I am thoroughly
> disappointed with LinkSys since the acquisition by Cisco. For the sake of
> what was once a rock-solid product and great brand name, I hope things
> change soon.
>
--
Security through obscurity falls apart when someone steals your
source code.
--------------------------------------------------------------------
PGP Key: http://www.mattcaron.net/pgp_key.txt
~~ Matt Caron ~~
Powered by blists - more mailing lists