mailing list archives
(Annex A) ADSL Road Runner Exploit Description & Theory
From: gp32boy () hotmail com
Date: 2 Sep 2005 21:14:08 -0000
This back door was found by testing the ports with telnet. By running through each open port
individually I managed to find a hole that obviously the creators have made. This allows you to
remotely access the router and manipulate the features and find information.
Typically the router would have ports 23 (telnet) and port 244. When you telnet the port on 23
you are greeted with a login prompt. This would require a hacker to key in a password. Further
accessing the router on port 244, you are again greeted with this login prompt. However, the
difference is that you do not need a password, you can simply press enter to login.
Once access is granted the flaw can lead a hacker to access data and possibly plant and sniff
traffic on the modem. Also, the hacker can reset the router. There are other features
that can be found that maybe of interest such as the cache and other data. and is potentially a
The exact version of the modem is still to be found, however this is currently seen in the many
of the latest ADSL Road Runner modems in the Annex A family.
- (Annex A) ADSL Road Runner Exploit Description & Theory gp32boy (Sep 07)