One Article Review

Accueil - L'article:
Source BAE.webp BAE
Identifiant 352311
Date de publication 2017-03-06 12:13:46 (vue: 2017-03-06 12:13:46)
Titre Multiple vulnerabilities affecting several ASUS Routers
Texte Written by Eldar MarcussenAffected Vendor: ASUS http://www.asus.com/au/Networking/Wireless-Routers-Products/Affected Device: Multiple - including: RT-AC3200Affected Version: Multiple - including: 3.0.0.4.378_7838Issue type: Multiple VulnerabilitiesRelease Date: 14 Apr 2016Discovered by: T.J. ActonIssue status: Vendor patch available athttp://www.asuswrt.net/2016/03/30/asus-release-beta-firmware-for-acn-router  SummaryASUS produces a suite of mid to high-end consumer-grade routers. The RT-AC3200 is confirmed to be affected, and the following devices are assumed to be affected:TM-AC1900RT-AC3200RT-AC87URT-AC68URT-AC68PRT-AC68RRT-AC68WRT-AC66RRT-AC66WRT-AC66URT-AC56URT-AC51URT-N18U1. Insecure default configuration for the Anonymous FTP user accountDescriptionThe affected ASUS routers suffer from insecure default configuration for Anonymous users, once anonymous access in enabled. Write access is enabled for all directories in the attached storage by default. Furthermore, the administrator is not able to restrict read or write access for any specific directories on attached storage devices.ImpactThe anonymous FTP user can write arbitrary files to the attached storage device.2. FTP users can access certain system files when Download Master is installed
Envoyé Oui
Condensat  http://www /etc /etc/passwd /etc/shadow /opt250 /tmp/mnt/sda1/asusware 00:00 05impactattackers 0image 1/rt 100 11269 12:15 12:20 12:57 12:58 14:09 150 156 168 192 1:acton 1connected 2012 2013 2014 2016discovered 214 220 230 26/03/2016 263 283 2860 2fasus 2fasusware 3264 347video 36108 378 4096 48:5a:3f:6d:02:a4 694 6connected 7838issue 78:31:c1:cd:11:63 8200 860 :8200minidlna able ac1900rt ac3200 ac3200/sda1 ac3200affected ac3200rt ac51urt ac56urt ac66rrt ac66urt ac66wrt ac68prt ac68rrt ac68urt ac68wrt ac87urt access accessproof account accountdescriptionthe accountscondition acn acondition active actonissue address address: admin administrative administrator advisory affected affected:tm affecting after agent aicloud aiclouddescriptionaicloud aidisk all already amule anonymous anonymous331 any apr arbitrary are arm arm/asusware arm/etc arm/etclrwxrwxrwx arm/includelrwxrwxrwx arm/infodrwxr arm/manlrwxrwxrwx arm/sbinlrwxrwxrwx arm/sharelrwxrwxrwx arm/tmplrwxrwxrwx arm/usr226 armdrwxr assumed asus asusware asuswrt athttp://www attached attacker attempts authenticated authentication automatically available bak bcondition been beta binlrwxrwxrwx bug by: bytes can cdef certain changed clients clientsid com/au/networking/wireless comes complete concepta conceptftp> concepthttp:// concepthttps://192 conf confdrwxrwxrwx configuration confirmed connections connections0 consumer contacted22/03/2016 context copying cracks created credentials currently cxxxxxximpactthe data date: default details device device: devices directories directory disclosure dm2 doing download downloadmaster drwxrwxrwx due ed2k eldar enabled enabledcondition end entering eta226 etc etc250 existing exploit exposed exposure extended external feb file files filesdescriptionthe firmware flaw following from ftp ftp> furthermore gain gains general grade granted had has hash hashed hello here high htmldrwxrwxrwx http://www impactattackers impactthe impersonate impersonating include includes: including including: info information init insecure installed installedcondition installeddescriptionthe interface internal ip/host ipkg issue jan jul kib/s lead leads legend:condition leverages liblrwxrwxrwx libraryaudio lighthttpd lighttpd lighttpdpassword lighttpdpasswordsession limited listing local login lrwxrwxrwx ls229 mac man management marcussenaffected master match md5 mid minidlna mode modules multiple n18u1 name net/2016/03/30/asus network not note: nzbget oct once only opensolutionapply other overwrite passive passwd passwd229 passwdlocal: password password: patch per permissions please poc port possible privileges produces products/affected proof public put read receive relating release released remote remote: remotely response restrict result retrieve retrieves root router  router/ routers rwxrwxrwx same samsung sbin script scriptdrwxrwxrwx send sensitive sent series server serverdescriptionaicloud serverdescriptionthe service session several sh226 share shell snarf spawn specific specify spoof ssh ssh/admin statistics status: statusmedia storage stored successful successfully suffer suffers suite summaryasus symlinks system test the current time timeline07/01/2016 tja tmp to any transmission traversal type type: unauthenticated unknown unsalted usb user user at users useruserconditionsanonymousftp usr valid vendor vendor: version: vulnerabilities vulnerabilitiesrelease vulnerability weak welcome when which whilst will without write written |*************************************************************************************************************************************| |||19683| |||39223| |||41235|
Tags Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: