Forgot your password?
typodupeerror
Networking Security Hardware IT

Remote Linksys 0-Day Root Exploit Uncovered 133

Posted by samzenpus
from the protect-ya-neck dept.
Orome1 writes "DefenseCode researchers have uncovered a remote root access vulnerability in the default installation of Linksys routers. They contacted Cisco and shared a detailed vulnerability description along with the PoC exploit for the vulnerability. Cisco claimed that the vulnerability was already fixed in the latest firmware release, which turned out to be incorrect. The latest Linksys firmware (4.30.14) and all previous versions are still vulnerable."
This discussion has been archived. No new comments can be posted.

Remote Linksys 0-Day Root Exploit Uncovered

Comments Filter:
  • Re:WRT54GL (Score:4, Interesting)

    by Synerg1y (2169962) on Monday January 14, 2013 @06:18PM (#42586153)
    Sure, every network anything has had security issues and will. Imho, remote web management is only useful to a very few select users, to get back home, ssh is the way to go... which you'd set up in web management :)

    There was also a vulnerability late last year that revolved around a specific service. The scope is different though, you can turn off a router service inconveniencing yourself till a patch is released... the article didn't provide enough detail on what's affected on the linksys firmware leading me to suspect stock firmware, stock settings... aka the most vulnerable of the vulnerable users group.
  • Re:Zero day? (Score:5, Interesting)

    by AmiMoJo (196126) * <mojoNO@SPAMworld3.net> on Monday January 14, 2013 @06:42PM (#42586383) Homepage

    The term "remote" is also a bit misleading, in that it looks like you need to be on the local network already to use this vulnerability. In the video their IP address is 192.168.1.1. Far less serious than being able to get root from the internet or without having to authenticate a wifi connection first. In fact I bet 95% of affected routers have the default web interface password anyway.

    The main people who should be worried are people with open access wifi or LAN ports, such as cafes and hotels.

  • by Anonymous Coward on Monday January 14, 2013 @09:55PM (#42587997)

    Unless you have remote administration enabled, this exploit is only achievable from a system within the local network.

    A web browser on the local network opens a malicious webpage. Now, what?

  • Re:WRT54GL (Score:5, Interesting)

    by clarkn0va (807617) <(moc.liamg) (ta) (teg.tpa)> on Monday January 14, 2013 @11:15PM (#42588383) Homepage

    The WRT54GL is the minority of all routers.

    For those who don't know, the L in WRT54GL stands for Linux. This routers was differentiated from the contemporary revision WRT54G only in that it ran the Linux-based firmware. While subsequent revisions of the WRT54G featured less and less capable hardware, the WRT54GL maintained its original configuration of flash and RAM, allowing it to run third party firmwares such as dd-wrt, openwrt, and Tomato.

    To the average consumer, the WRT54GL looked exactly like the significantly less expensive WRT54G and its prolific variants, but to the power user and professional, it held much greater potential and warranted the higher price tag. These pros and power users generally have no use for stock firmwares, and are only interested in the open nature of the hardware platform, and are therefore willing to pay the premium (although personally I preferred the more capable and less expensive ASUS WL-520gu. I guess legend status has its privileges).

    So yes, it is shocking to those who are familiar with the platform to learn that any significant portion of WRT54GL is running stock firmware in the wild.

  • Fritz boz (Score:4, Interesting)

    by 1s44c (552956) on Tuesday January 15, 2013 @07:03AM (#42589891)

    I highly recommend getting a fritz box. The amount of stuff they can do is really cool.
    The model I have is a NAS server, Media server for my blu-ray player, a PBX for cheap SIP calls, an answering machine for SIP or land line calls, a DECT phone base station, A print server for my USB printer, a VDSL modem, and a 4 port gigabit switch. All that in a small low power box.

    Also you can update the firmware fairly easily although it does trash all your settings.

    No I don't work for them.

There is hardly a thing in the world that some man can not make a little worse and sell a little cheaper.

Working...