[Am-info] LinkSys EtherFast Router Remote Administration Enabled Vulnerability

Fred A. Miller fm@cupserv.org
Tue, 25 Jun 2002 16:43:40 -0400


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

LinkSys EtherFast Router Remote Administration Enabled Vulnerability
BugTraq ID: 4987
Remote: Yes
Date Published: Jun 11 2002 12:00A
Relevant URL:
http://www.securityfocus.com/bid/4987
Summary:

Linksys EtherFast routers are small four port routers designed to=20
optimize the use of DSL or Cable connections. EtherFast routers provide=20
advanced features such as Network Address Translation, and DHCP=20
support.

A vulnerability has been introduced into the current version of the
firmware (1.42.7) released May 1, 2002. Reportedly, the firmware does=20
not respect existing rules that deny remote administration of the=20
router. The current version of the firmware opens TCP port 5678 for=20
remote administration.

The firmware opens up a TCP port for remote administration even though
"Block WAN" and "Remote Admin" options are disabled.

An attacker may be able to exploit this vulnerability to mount further
attacks against a vulnerable device.

Earlier versions of the firmware are not affected by this issue.

- --=20
Fred A. Miller
Systems Administrator
Cornell Univ. Press Services
fm@cupserv.org, www.cupserv.org
- --- SuSE Linux v8.0 Pro, Netscape 7.0---
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAj0Y1f0ACgkQB9vk4ichYXfScACgoWZ8xLbVetbwdPQ0Q9LCpZ8R
6yEAoIEUT+GDqPNzxjMX6bvOpvMqxvgB
=3Dewr/
-----END PGP SIGNATURE-----