lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 07 Aug 2006 16:32:18 -0700 From: Nicholas Knight <nknight@...awaynet.com> To: Ginsu Rabbit <ginsurabbit@...mail.com> Cc: bugtraq@...urityfocus.com Subject: Re: linksys WRT54g authentication bypass Ginsu Rabbit wrote: > I'm having some trouble believing this hasn't been reported before. If > you have a linksys router handy, please check to see whether it is > vulnerable to this attack. It's possible that all of the linksys router > web UIs have the same bug. Hopefully the problem is isolated to one > particular model or firmware revision. > > I. DESCRIPTION > > Tested product: Linksys WRT54g home router, firmware revision 1.00.9. In the future, please specify the hardware revision of the unit. The WRT54G line spans some six/seven significant generations, and includes both Linux-based and VxWorks-based units, and the firmware revisions between the two are _NOT_ in sync. -NK
Powered by blists - more mailing lists