• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

PSA: Backdoor found in many DLink Routers.

Engineer

Elite Member
Just a FYI:

http://www.dslreports.com/shownews/Backdoor-Found-in-DLink-Routers-126213

A back door has been found in the firmware for a number of later-model D-Link router models, allowing an intruder to bypass user authentication. The backdoor was first found by Craig Heffner, a vulnerability researcher with Tactical Network Solutions, who was tinkering with the 1.13 version of the firmware for the D-Link DIR-100 revA router.

According to a blog post by Heffner, the backdoor is trivially-easy to access.

"If your browser’s user agent string is 'xmlset_roodkcableoj28840ybtide' (no quotes), you can access the web interface without any authentication and view/change the device settings," notes Heffner.

Impacted models include the DIR-100, DI-524, DI-524UP, DI-604S, DI-604UP, DI-604+, TM-G5240 and potentially the DIR-615 (distributed by Virgin Mobile). Planex Communications BRL-04UR and BRL-04CW routers may also be impacted, as they utilize the same firmware.

See the rest by clicking the link above....
 
Sigh... Looks like drive-by WiFi leechers will have a new tool in their arsenal now.

Tested this on my DIR-655 and it didn't work, thankfully.
 
Back
Top