lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <0B977C4D-23AC-4382-990D-E3F132B302C7@gmail.com>
Date: Tue, 22 Oct 2013 17:01:35 -0400
From: Zachary Cutlip <uid000@...il.com>
To: full-disclosure <full-disclosure@...ts.grok.org.uk>
Subject: Blog Post: Complete,
	Persistent Compromise of Netgear Wireless Routers

I did a writeup of a neat authentication bypass bug I found[1] in Netgear's venerable WNDR3700v4 wireless router.  It gives you complete, unauthenticated access to the router's administrative interface.  Authentication is disabled persistently, surviving reboots.  Thought I'd share it:

http://shadow-file.blogspot.com/2013/10/complete-persistent-compromise-of.html

Thanks!
Zach
Twitter: @zcutlip

[1] Jacob Holocomb if Independent Security Evaluators let me know he found a similar bug back in April this year in the WNDR4700.  Here's a link to that report:
http://securityevaluators.com/content/case-studies/routers/netgear_wndr4700.jsp

--
:wq!


Download attachment "signature.asc" of type "application/pgp-signature" (236 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ