lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050902211408.20020.qmail@securityfocus.com>
Date: 2 Sep 2005 21:14:08 -0000
From: gp32boy@...mail.com
To: bugtraq@...urityfocus.com
Subject: (Annex A) ADSL Road Runner Exploit Description & Theory


This back door was found by testing the ports with telnet. By running through each open port 

individually I managed to find a hole that obviously the creators have made. This allows you to 

remotely access the router and manipulate the features and find information.

Typically the router would have ports 23 (telnet) and port 244. When you telnet the port on 23 

you are greeted with a login prompt. This would require a hacker to key in a password. Further 

accessing the router on port 244, you are again greeted with this login prompt. However, the 

difference is that you do not need a password, you can simply press enter to login.

Once access is granted the flaw can lead a hacker to access data and possibly plant and sniff  

traffic on the modem. Also, the hacker can reset the router. There are other features 

that can be found that maybe of interest such as the cache and other data. and is potentially a 

high-risk flaw.

The exact version of the modem is still to be found, however this is currently seen in the many 

of the latest ADSL Road Runner modems in the Annex A family.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ