[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <0B977C4D-23AC-4382-990D-E3F132B302C7@gmail.com>
Date: Tue, 22 Oct 2013 17:01:35 -0400
From: Zachary Cutlip <uid000@...il.com>
To: full-disclosure <full-disclosure@...ts.grok.org.uk>
Subject: Blog Post: Complete,
Persistent Compromise of Netgear Wireless Routers
I did a writeup of a neat authentication bypass bug I found[1] in Netgear's venerable WNDR3700v4 wireless router. It gives you complete, unauthenticated access to the router's administrative interface. Authentication is disabled persistently, surviving reboots. Thought I'd share it:
http://shadow-file.blogspot.com/2013/10/complete-persistent-compromise-of.html
Thanks!
Zach
Twitter: @zcutlip
[1] Jacob Holocomb if Independent Security Evaluators let me know he found a similar bug back in April this year in the WNDR4700. Here's a link to that report:
http://securityevaluators.com/content/case-studies/routers/netgear_wndr4700.jsp
--
:wq!
Download attachment "signature.asc" of type "application/pgp-signature" (236 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists