lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070830231001.2477.qmail@securityfocus.com> Date: 30 Aug 2007 23:10:01 -0000 From: acheddamiman@...il.com To: bugtraq@...urityfocus.com Subject: Aztech router DSL600EU IP and ARP spoof The Aztech DSL600EU is vulnerable to IP|ARP spoof. Example: Webinterface disabled in WAN to LAN or EXT to IN zone but the port 80 is not blocked, one malicious client can be send one SYN inundation and calculate the sequence number (IP spoof) and conect to the web interface. By AchedDamiman