Vulnerability Development mailing list archives
Re: exploiting printers, home routers & smb routers
From: pgut001 () cs auckland ac nz (Peter Gutmann)
Date: Fri, 23 Aug 2002 14:51:50 +1200 (NZST)
<chrisd () cissmb pointclark net> writes:
I started thinking ..., I'm no hardware expert but couldn't this be modified & applied to all the home & small business routers ??? (linksys, smc, d-link, etc ...)
One thing which has always baffled me is why no trojans have yet appeared which telnet to the default gateway from the compromised box, log on using default passwords for Cisco, Linksys, Netgear, etc, routers, and disable all firewalling. This would probably get about 95% of all routers [1]. Peter. [1] OK, that's a random guess, let's say 99% of all SOHO routers and at least 50% of larger comercial setups.
Current thread:
- exploiting printers, home routers & smb routers chrisd (Aug 22)
- Re: exploiting printers, home routers & smb routers Stan Bubrouski (Aug 22)
- Re: exploiting printers, home routers & smb routers hellNbak (Aug 22)
- RE: exploiting printers, home routers & smb routers Nick Iglehart (Aug 22)
- Re: exploiting printers, home routers & smb routers FX (Aug 23)
- <Possible follow-ups>
- Re: exploiting printers, home routers & smb routers Peter Gutmann (Aug 22)