But here’s the kicker: this patch does nothing to prevent unauthenticated users from executing completely valid administrative HNAP actions, because all it does is ensure that the HNAP action is valid. That’s right, their patch doesn’t even address all the bugs listed in their own security advisory!
I think the most “insane” thing about this router is that it’s running the same buggy firmware that D-Link has been cramming in their routers for years…and the hits just keep on coming.
Craig Heffner has recently discovered an easy-to-exploit backdoor in several D-Link and Planex routers. As usual guys at devttys0.com made a great work!
One week later a similar backdoor was discovered on some NETGEAR devices.
Dans un moment de profonde solitude nocturne, Craig de /dev/ttyS0 s'est lancé dans le reverse d'un firmware de routeur D-Link. Il y a en particulier trouvé une version custom de thttpd dont la fonction d'authentification, faite maison, se trouve inclure ce qui ressemble fort à une backdoor.