Lucene search

K

XMicro.backdoor.txt

🗓️ 10 Apr 2004 00:00:00Reported by Gergely RiskoType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 25 Views

Backdoor in X-Micro Router allows remote access; default credentials pose great risk.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Backdoor in the X-Micro WLAN 11b Broadband Router  
  
FCC ID: RAFXWL-11BRRG  
Firmware Version: 1.2.2, 1.2.2.3 (probably others too)  
Remote: yes, easily expoitable  
Type: administration password, which always works  
  
The following username and password works in every case, even if you  
set an other password on the web interface:  
Username: super  
Password: super  
  
By default the builtin webserver is listening on all network  
interfaces (if connected to the internet, then it is accessible from  
the internet too). Using the webinterface one can install new  
firmware, download the old, view your password, etc., so he can:  
- make your board totally unusable, beyond repair  
- install viruses, trojans, sniffers, etc. in your router  
- get your password for your provider and maybe for your emails.  
  
Possible fixes:  
1. Set up portforwarding, and forward port 80, this way from the WAN  
interface an attack is impossible. But be aware, that anyone in your  
local LAN (possible over a wireless connection) can login to your  
router.  
  
2. Upload a fixed firmware. I've made an unofficial (but fixed)  
one. You can download it from  
http://xmicro.risko.hu/own-firmwares/xm-11brrg-0.1/xm-11brrg-0.1.bin  
This firmware is unofficial. NO WARRANTY.  
This firmware also fix other bugs, for a list see:   
http://xmicro.risko.hu/own-firmwares/xm-11brrg-0.1/Changes  
The tool, which used to create the image also released under the  
GPL: http://xmicro.risko.hu/US8181-20040410.tar.gz  
DOCS: http://xmicro.risko.hu/  
  
I don't know that the folks at X-Micro (who built this so nasty  
backdoor in this device) when will reply, I bcc'ed this mail to them.  
I've chosen not contact with them earlier, because they violated the  
GPL seriously, the open source community tried to communicate with  
them, but without any positive results. And I'm sure that they know  
about this remote backdoor.  
  
Gergely Risko  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
10 Apr 2004 00:00Current
7.4High risk
Vulners AI Score7.4
25
.json
Report