1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Will This Security Hole Be Fixed?

Discussion in 'Cisco/Linksys Wireless Routers' started by itsmeohmy, Aug 8, 2006.

  1. itsmeohmy

    itsmeohmy Network Guru Member

    The following effects WRT54GS routers with 1.x firmware vulnerable. Seeing the person who found the hole was only able to test on his/her router and the firmware codebase is largely shared other firmware versions may be vulnerable too as is other WRT54 routers. Does anyone know if this will be addressed soon? Seeing that attacks using JavaScript which includes penetrating internal networks is now in the headlines its something that should be looked into. All someone has to do is use JavaScript on a webpage that you visit to access the router and change it configuration settings likely using AJAX and since it happens in background you wont know what hit you. Only thing I can think of to mitigate this is to pick a random IP for the router and not the default so attack will be harder, but with JavaScript and Java it wouldn't be hard to figure out what the local IP is and then deduce what the router IP is.

    Original Report : http://www.securityfocus.com/archive/1/442467
  2. Toxic

    Toxic Administrator Staff Member

    Vulnerable: Linksys WRT54G v1.0 1.0.9 (Firmware)

    WRONG... the initial post says

    Tested product: Linksys WRT54G home router, firmware revision 1.00.9.

    1. so do we belive someone who cannot even post correctly?

    2. this is based on v5 and v6 WRT54G. This is a HyperWRT forum. that is based on the GS code 4.71.1
  3. itsmeohmy

    itsmeohmy Network Guru Member

    The person was not the one who posted it incorrectly as GS. SecurityFocus usually picks a name to give to the vulnerability and they chose that and they are the ones who posted it incorrectly as GS.

    Correct me if I am wrong I thought most of the WRT54 routers shared same code, different firmwares but basic code is reused? I'm going to run a test on my v4.71.1, Hyperwrt 2.1b1 + Thibor15c just to see and just to be safe. Sorry for posting in wrong forum, HyperWRT is where I usually go so didn't think twice about posting there. =o(
  4. Esquire

    Esquire Mesquire Staff Member Member

    No, not all WRT54G routers share the same code.

    Not trying to downplay or comment on the flaw, but it seems incorrectly labelling it as a GS is not the only mistake he's made. Don't you find it a bit odd to see they are reporting the flaw on a WRT54G v1.0 using version 1.0.9 firmware when the WRT54G v1.0 has been discontinued for years?!

    In any case Ginsu Rabbit reported the flaw on a 1.0.9 version firmware without mentioning the router version, but it looks like the firmware for WRT54G v5 and above (the latest is version 1.00.9) - there is no 1.0.9 version firmware released officially for WRT54G v1.0 to v4.0 and any version in between.

Share This Page