lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 14 Feb 2018 11:12:57 +0200
From: SecuriTeam SSD <>
Subject: [FD] SSD Advisory – TrendNet AUTHORIZED_GROUP Information Disclosure

SSD Advisory – TrendNet AUTHORIZED_GROUP Information Disclosure

Full report:
Twitter: @SecuriTeam_SSD
Weibo: SecuriTeam_SSD

Vulnerability Summary
The following advisory describes an information disclosure found in the
following TrendNet routers:

 * TEW-751DR – v1.03B03
 * TEW-752DRU – v1.03B01
 * TEW733GR – v1.03B01

TRENDnet’s “N600 Dual Band Wireless Router, model TEW-751DR, offers proven
concurrent Dual Band 300 Mbps Wireless N networking. Embedded GREENnet
technology reduces power consumption by up to 50%. For your convenience
this router comes pre-encrypted and features guest networks. Seamlessly
stream HD video with this powerful router.”

An independent security researcher has reported this vulnerability to
Beyond Security’s SecuriTeam Secure Disclosure program.

Vendor response
Several attempts to email TrendNet went unanswered, we have no idea what is
the status of a fix or availability of a workaround.

Vulnerability details
When an Admin is log-in to one of the mentioned TrendNet routers – it will
trigger the global variable: $AUTHORIZED_GROUP >= 1.

An attacker can use this global variable to bypass security checks and use
it to read arbitrary files.

Proof of Concept

Download attachment "SSD Advisory – TrendNet AUTHORIZED_GROUP Information Disclosure.pdf" of type "application/pdf" (195011 bytes)

Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists