Glide Underground

Routers Vulnerable

Articles / Personal Stuff/Random News
Date: Jan 14, 2008 - 12:00 PM
If you have home networking, you might want to watch out and use non-IE browsing.

There's a new exploit that can do some damage to your router using the UPNP standards.

When the victim visits the malicious SWF file, the above 6 steps will silently execute in the background. At that moment the attacker will have control over the service the portforwarding rule was assigned for for. Keep in mind that no XSS is required, it is a matter of visiting the wrong resource at the wrong time. Also, keep in mind that 99% of home routers are vulnerable to this attack as all of them support UPnP to one degree or another.

I repeat myself far too much, but I guess I have another opportunity to mention that adding a portforwarding is only one of the many things someone can do to your router. The most malicious of all malicious things is to change the primary DNS server. That will effectively turn the router and the network it controls into a zombie which the attacker can take advantage of whenever they feel like it. It is also possible to reset the admin credentials and create the sort of onion routing network all the bad guys want. We hope that by exposing this information, we will drastically improve the situation for the future. I think that this is a lot better than keeping it for ourselves or risking it all by given the criminals the opportunity to have in possession a secret which no one else is aware of.




This article is from Glide Underground
http://www.glideunderground.com/

The URL for this story is:
http://www.glideunderground.com/modules.php?op=modload&name=News&file=article&sid=3331