Monday, October 14, 2013

Your D-Link router may have a backdoor

By George Chidi
Sunday, October 13, 2013 21:46 EDT

A masked member of "Anonymous" explains a hack on a homemade video. Screengrab via YouTube.

NSA-inspired paranoia within the hacker community about the pervasiveness of the government’s power to compromise equipment may be bearing real fruit.

A curious computer security professional published findings Saturday that deconstructed the firmware code for some D-Link router devices and discovered a backdoor built directly into the code. By changing the user-agent in a web browser to “xmlset_roodkcableoj28840ybtide,” a user could bypass the security on the device and get online or control the higher functions of the router.

The hackers at devtts0.com say models DIR-100, DI-524, DI-524UP, DI-604S, DI-604UP, DI-604+, and TM-G5240 use the compromised firmware.

Note the name of the user-agent needed to bypass the router security, spelled backward: edit by 04882 joel backdoor.
D-Link’s international headquarters are located in Taipei, Taiwan, Republic of China.

No comments:

Post a Comment

[Warning: These emails are spam. Do not click on any links contained with the body of junk email if you receive this in your inbox. What is email spam?]

Note: Only a member of this blog may post a comment.

Google

Related Posts Plugin for WordPress, Blogger...