[Am-info] LinkSys EtherFast Router Remote Administration Enabled Vulnerability
Fred A. Miller
fm@cupserv.org
Tue, 25 Jun 2002 16:43:40 -0400
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
LinkSys EtherFast Router Remote Administration Enabled Vulnerability
BugTraq ID: 4987
Remote: Yes
Date Published: Jun 11 2002 12:00A
Relevant URL:
http://www.securityfocus.com/bid/4987
Summary:
Linksys EtherFast routers are small four port routers designed to=20
optimize the use of DSL or Cable connections. EtherFast routers provide=20
advanced features such as Network Address Translation, and DHCP=20
support.
A vulnerability has been introduced into the current version of the
firmware (1.42.7) released May 1, 2002. Reportedly, the firmware does=20
not respect existing rules that deny remote administration of the=20
router. The current version of the firmware opens TCP port 5678 for=20
remote administration.
The firmware opens up a TCP port for remote administration even though
"Block WAN" and "Remote Admin" options are disabled.
An attacker may be able to exploit this vulnerability to mount further
attacks against a vulnerable device.
Earlier versions of the firmware are not affected by this issue.
- --=20
Fred A. Miller
Systems Administrator
Cornell Univ. Press Services
fm@cupserv.org, www.cupserv.org
- --- SuSE Linux v8.0 Pro, Netscape 7.0---
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAj0Y1f0ACgkQB9vk4ichYXfScACgoWZ8xLbVetbwdPQ0Q9LCpZ8R
6yEAoIEUT+GDqPNzxjMX6bvOpvMqxvgB
=3Dewr/
-----END PGP SIGNATURE-----