[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CABgXHn-cm5=7CZNX+dMM6g-pfpCq_ffWet3DdDs1uLdhdZ9R_w@mail.gmail.com>
Date: Thu, 16 Jan 2014 08:51:26 +0000
From: Dan Ballance <tzewang.dorje@...il.com>
To: Scott Helme <scotthelme@...mail.com>
Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: EE BrightBox router hacked - bares all if you
ask nicely
What a great write up and what an appalling mess for a UK ISP to be in in
2014. Absolutely shocking lack of security considerations. Thanks for
sharing this. I've just followed you on Twitter as well,
cheers,
Dan.
On 15 January 2014 20:28, Scott Helme <scotthelme@...mail.com> wrote:
> The BrightBox router is the standard equipment issued by UK ISP Everything
> Everywhere (EE) to its subscribers.
>
> The device not only leaks sensitive data but is remotely exploitable too.
> An attacker even has the ability to take control of your account as the
> router leaks your ISP account credentials.
>
> You can read the full article here:
> https://scotthelme.co.uk/ee-brightbox-router-hacked/
>
> Scott.
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists