[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] Re: Netgear WG602 Accesspoint vulnerability
- To: Full Discplosure <full-disclosure@xxxxxxxxxxxxxxxx>
- Subject: Re: [Full-Disclosure] Re: Netgear WG602 Accesspoint vulnerability
- From: Rip Toren <rtoren@xxxxxxxxxxxxxxx>
- Date: Tue, 8 Jun 2004 08:12:22 -0400
Quoting Jan Jungnickel <jj@xxxxxxxxxxxx>:
> On Tue, Jun 08, 2004 at 10:05:56AM +0200, pera@xxxxxxxxxxxxx wrote:
>
> > >Netgear has 'fixed' this by changing the username and
> > >password to something else.
> > I heard the username has been changed to "superman" with the
> > password "21241036". I wonder whose phone number THIS is...
>
> Precisely. I'm pretty stunned by this blatant example of
> stupidity :/
>
> --
> carmunity.com GmbH Mary-Astell-Strasse 2
> Jan Jungnickel 28359 Bremen
<<snip>>
Depending upon how the account name and password are stored, this might have
been as
simple as a binary edit of the firmware, with some checksum cleanup.
Unfortunately, it
would only take a couple of hours to completely hide any literal values from a
'strings'
search.
Even if another firmware is released, and it shows no strings; can it be
assured that
the account data has not just been hidden. This might also mean that the V2
product is
also compromised, but with masked account data... who knows?
Since they seem to have demonstrated a corporate commitment to 'backdoor'
their product;
it might be time to find a more customer friendly supplier. At least until the
is some
public statement by NetGear about the situation.
I care, I used one of these; until 10 minutes ago.
--
Rip Toren
Senior Information Assurance Engineer
Futures Inc.
email: rtoren@xxxxxxxxxxxxxxx
website: http://www.futures-inc.com
-------------------------------------------------
This mail sent through IMP: http://horde.org/imp/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html