mailing list archives
Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability
From: Hanno Böck <hanno () hboeck de>
Date: Tue, 16 Jun 2009 12:42:06 +0200
Am Montag 15 Juni 2009 schrieb Tom Neaves:
Within the "/cgi-bin/" directory of the administrative web interface exists
file called "firmwarecfg". This file is used for firmware upgrades. A
request for this file causes the web server to hang. The web server will
responding to requests and the administrative interface will become
until the router is physically restarted.
While the router will still continue to function at the network level, i.e.
still respond to ICMP echo requests and issue leases via DHCP, an
no longer be able to interact with the administrative web interface.
This attack can be carried out internally within the network, or over the
if the administrator has enabled the "Remote Management" feature on the
Don't have such a device for tests, but isn't it possible to exploit this
remotely through CSRF even without "Remote Management" option?
ip of the router?)
Hanno Böck Blog: http://www.hboeck.de/
GPG: 3DBD3B20 Jabber/Mail: hanno () hboeck de
http://ausdenaugenausdemsinn.de - Kein Sicherheitsrabatt für CO2-Speicher
http://tinyurl.com/dceu73 - Internetzensur stoppen!
http://schokokeks.org - professional webhosting
Description: This is a digitally signed message part.
Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability Hanno Böck (Jun 16)