ID

VAR-E-201310-0513


TITLE

ASUS RT-N13U Backdoor Account

Trust: 0.5

sources: PACKETSTORM: 123822

DESCRIPTION

The ASUS RT-N13U home router comes configured with an administrative root shell with a default password and is available via telnetd. Changing the password on the web interface does not remediate the issue.

Trust: 0.5

sources: PACKETSTORM: 123822

AFFECTED PRODUCTS

vendor:asusmodel:rt-n13uscope: - version: -

Trust: 0.5

sources: PACKETSTORM: 123822

EXPLOIT

The ASUS RT-N13U home router comes configured with an unsecured telnet for user "admin".
Telnetting in with this user will result in a root shell. The telnet is not configurable from the web interface, nor does changing the password on the web interface's admin user make any difference. I have alerted ASUS to the problem on 10/25/13. I have been able to verify that this telnet interface is visible from both the LAN and WAN.

Sincerely,
Shellster

Trust: 0.5

sources: PACKETSTORM: 123822

EXPLOIT HASH

LOCAL

SOURCE

md5: a2364ad976a4429d601811b875726a35
sha-1: 3b0c852278da8e9811d3c956fd05a9fd8262b284
sha-256: ecd490cdd8df6d6a8157d63cac98201e4d8df54dcb1b076013ed6fe6f001b466
md5: a2364ad976a4429d601811b875726a35

Trust: 0.5

sources: PACKETSTORM: 123822

EXPLOIT LANGUAGE

shell

Trust: 0.5

sources: PACKETSTORM: 123822

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 123822

TYPE

root

Trust: 0.5

sources: PACKETSTORM: 123822

TAGS

tag:exploit

Trust: 0.5

tag:web

Trust: 0.5

tag:shell

Trust: 0.5

tag:root

Trust: 0.5

sources: PACKETSTORM: 123822

CREDITS

Shellster

Trust: 0.5

sources: PACKETSTORM: 123822

EXTERNAL IDS

db:PACKETSTORMid:123822

Trust: 0.5

sources: PACKETSTORM: 123822

SOURCES

db:PACKETSTORMid:123822

LAST UPDATE DATE

2022-07-27T09:18:52.311000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:123822date:2013-10-29T12:02:22