Home routers (using DD-WRT) under attack...
FYI...
DD-WRT vuln...
- http://isc.sans.org/diary.html?storyid=6853
Last Updated: 2009-07-22 20:43:54 UTC - "... new vulnerability in DD-WRT that was being reported in the Register at:
http://www.theregister.co.uk/2009/07...t_router_vuln/ .
DD-WRT runs on routers by Linksys, D-Link Buffalo, ASUS and well as other routers. The complete list can be found at:
http://www.dd-wrt.com/wiki/index.php/Supported_Devices
This vulnerability will allow an attacker to run programs with root priviledges on a vulnerable router. More information can be found on the DD-WRT Forum at:
http://www.dd-wrt.com/phpBB2/viewtop...er=asc&start=0 "
:fear:
SMC router vuln - unpatched
FYI...
SMC router vuln - unpatched
- http://www.wired.com/threatlevel/200...-warner-cable/
October 20, 2009 - "A vulnerability in a Time Warner cable modem and Wi-Fi router deployed to 65,000 customers would allow a hacker to remotely access the device’s administrative menu over the internet, and potentially change the settings to intercept traffic, according to a blogger who discovered the issue. Time Warner acknowledged the problem to Threat Level on Tuesday, and says it’s in the process of testing replacement firmware code from the router manufacturer, which it plans to push out to customers soon... The vulnerability lies with Time Warner’s SMC8014 series cable modem/Wi-Fi router combo, made by SMC. The device is one of several options Time Warner offers to customers who don’t want to install their own modem and router to use with the company’s broadband service..."
- http://www.f-secure.com/weblog/archives/00001799.html
October 23, 2009
:fear:
2wire Gateway router/modem - update available
FYI...
2wire Gateway router/modem - update available
- http://web.nvd.nist.gov/view/vuln/de...=CVE-2009-3962
Last revised: 11/18/2009 - "The management interface on the 2wire Gateway 1700HG, 1701HG, 1800HW, 2071, 2700HG, and 2701HG-T with software before 5.29.52 allows remote attackers to cause a denial of service (reboot)...
CVSS v2 Base Score: 7.8 (HIGH) ...
- http://webvuln.com/advisories/2wire....of.service.txt
Solution Status: Vendor issued firmware patches; Providers are in charge of applying the patches...
WORKAROUND: Disable Remote Management in Firewall -> Advanced Settings...
- http://www.us-cert.gov/cas/bulletins/SB09-327.html#high
November 23, 2009
:fear::fear: