Bitcoin Forum
May 07, 2024, 01:35:36 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Treacherous backdoor found in TP-Link routers  (Read 1810 times)
kev7112001 (OP)
Sr. Member
****
Offline Offline

Activity: 479
Merit: 250


View Profile
June 17, 2013, 07:17:01 PM
 #1

http://www.h-online.com/security/news/item/Treacherous-backdoor-found-in-TP-Link-routers-1822720.html

http://sekurak.pl/tp-link-httptftp-backdoor/

thought of AVALON when i seen this

MCXNOW MODERATOR
The network tries to produce one block per 10 minutes. It does this by automatically adjusting how difficult it is to produce blocks.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715045736
Hero Member
*
Offline Offline

Posts: 1715045736

View Profile Personal Message (Offline)

Ignore
1715045736
Reply with quote  #2

1715045736
Report to moderator
Kartaiv
Member
**
Offline Offline

Activity: 61
Merit: 10


View Profile
June 17, 2013, 07:29:52 PM
 #2


All the Avalon style TP Links are running open-source firmware. Should not be an issue.
wolverine.ks
Sr. Member
****
Offline Offline

Activity: 375
Merit: 250



View Profile
June 17, 2013, 07:36:27 PM
 #3

I'm not a programmer in the least, but that doesn't seem to be able to happen by accident. could it? this isn't a bug, this is intentional?
trigeek
Sr. Member
****
Offline Offline

Activity: 252
Merit: 250


View Profile WWW
June 17, 2013, 07:40:40 PM
 #4

I'm not a programmer in the least, but that doesn't seem to be able to happen by accident. could it? this isn't a bug, this is intentional?

It looks too me like a debugging/development shortcut that was left in, most likely by accident.  It is a nice feature for debugging, because instead of having to log in to the router to force it to do something, you can just ping it with an HTTP request, which is very easy to repeat... just hit F5 Smiley

Additionally, it's only exploitable if you have the admin page set to be accessible from the WAN port.  There is rarely ever a good reason to do this if you're actually using the device as a router directly connected to your internet connection.  For almost every use case here, the TP-Link would be on the local LAN behind another router/firewall, so even if WAN admin was enabled, there would be no way for anyone to remotely exploit this bug unless they could get on to your local network (and you would have other, bigger problems then.)

# HashStrike $ Mining Pools -- Ruby -- Karma -- Mint -- Leaf -- Zeit -- Syn
** Low Fees ** Awesome support ** Super stable **

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!