Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: ASUS RT-N13U Unsecured Telnet on LAN and WAN
From: Craig Young <vuln-report () secur3 us>
Date: Wed, 30 Oct 2013 12:00:31 -0400

I received the same automated response when reporting a handful of
security flaws to Asus.  The following week, I submitted another
message to techsupport () asus com and received a relevant response
within 24 hours.

On a side note, I checked a different (slightly newer) Asus router
with the most recent firmware and it is not affected -- telnet starts
and stops as expected per the setting in the HTTP UI, the password
remains the same as the admin password, and telnet is not externally
accessible unless the firewall is disabled.

Best Regards,
Craig Young
@CraigTweets

On Tue, Oct 29, 2013 at 9:05 AM, Shelby Spencer <pwd_manager () hotmail com> wrote:
It should be further noted, that setting a password for the telnet account
via the /sbin/chpasswd.sh script is only valid until the next reboot when it
gets wiped out.

After alerting ASUS, I got the following non-reply.  They are not taking the
problem seriously (they just closed out the ticket with a generic response):

Thank you for contacting ASUS Customer Service.
My name is Joe and it is my pleasure to help you with your problem.

Thank you for contacting ASUS and providing your feedback. Your information
has been documented. If you have further questions or concerns, please
contact us at 812-282-2787 and we will be happy to help you.

Welcome to refer Troubleshooting & FAQ for ASUS products in ASUS website:
http://support.asus.com/servicehome.aspx?SLanguage=en

If you continue to experience issues in the future, please do not hesitate
to contact us.

An email survey will be sent to you within the next 5 days. Please be sure
to rate the service I provided to you today.


________________________________
From: pwd_manager () hotmail com
To: full-disclosure () lists grok org uk
Date: Mon, 28 Oct 2013 16:33:52 -0700
Subject: [Full-disclosure] ASUS RT-N13U Unsecured Telnet on LAN and WAN


The ASUS RT-N13U home router comes configured with an unsecured telnet for
user "admin".
Telnetting in with this user will result in a root shell.  The telnet is not
configurable from the web interface, nor does changing the password on the
web interface's admin user make any difference.  I have alerted ASUS to the
problem on 10/25/13.  I have been able to verify that this telnet interface
is visible from both the LAN and WAN.

Sincerely,
Shellster

_______________________________________________ Full-Disclosure - We believe
in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted
and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



-- 
-Craig
http://secur3.us/pub_key.asc

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]