Jump to content

Search the Community

Showing results for tags 'Hardware'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ::| CP Home |::
    • Announcements
    • Suggestion Box
    • Newbie Zone
  • ::| CP Community |::
    • Introduce Yourself
    • Community Lounge
    • Contests & Competitions
    • Link Heaven
  • ::| CP Mobile Zone |::
    • Android Area
    • iPhone/iPod Area
    • Windows Mobile Area
    • Symbian Area
    • Blackberry Area
  • ::| CP Download Links Section |::
    • Applications
    • Games
    • Music
    • E-Books
    • Web Development
    • Requests
    • Graphics Resources
    • All - In - Ones (AIO's)
    • iOS
  • ::| CP Graphics Corner |::
    • Graphics ShowRoom
    • Graphics Requests
    • Graphics Graveyard
  • ::| CP Technical Help & Support |::
    • Helpdesk
    • Tutorials, Manuals, & Tricks
    • Programming (C#, C++, JAVA, VB, .NET, PHPetc.)
    • Tech Discussion
    • Internet, Network & Security

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 1 result

  1. Saran999

    Back door found in D-Link routers

    D-secret is D-logon string allowing access to everything A group of embedded device hackers has turned up a vulnerability in D-Link consumer-level devices that provides unauthenticated access to the units' admin interfaces. The flaw means an attacker could take over all of the user-controllable functions of the popular home routers, which includes the DIR-100, DI-524, DI-524UP, DI-604S, DI-604UP, DI-604+ and TM-G5240 units. According to the post on /DEV/TTYS0, a couple of Planex routers are also affected, since they use the same firmware. A Binwalk extract of the DLink DIR-100 firmware revealed that an unauthenticated user needs only change their user agent string to xmlset_roodkcableoj28840ybtide to access the router's Web interface with no authentication. The /DEV/TTYS0 researcher found the user agent string inside a bunch of code designed to run simple string comparisons. For one of those comparisons, “if the strings match, the check_login function call is skipped and alpha_auth_check returns 1 (authentication OK)”, the author notes. Some commentards to that post claimed to have successfully tested the backdoor against devices visible to the Shodan device search engine. The /DEV/TTYS0 author, Craig, says the backdoor exists in v1.13 of the DIR-100revA products. At this point, there's no defence against the backdoor, so users are advised to disable WAN-port access to the administrative interfaces of affected products.
×