Networking hardware vendor TP-Link says it will prevent the loading of open source firmware on routers it sells in the United States in order to comply with new Federal Communications Commission requirements.
Tool used to find vulnerable routers and devices on the Internet and perform tests
"Eloi Vanderbeken from Synacktiv has identified an intentional backdoor in a module by Sercomm used by major router manufacturers (Cisco, Linksys, Netgear, etc.). The backdoor was ostensibly fixed — by obfuscating it and making it harder to access. The original report (PDF). And yeah, there is an exploit available ..." Rather than actually closing the backdoor, they just altered it so that the service was not enabled until you knocked the portal with a specially crafted Ethernet packet. Quoting Ars Technica: "The nature of the change, which leverages the same code as was used in the old firmware to provide administrative access over the concealed port, suggests that the backdoor is an intentional feature of the firmware ... Because of the format of the packets—raw Ethernet packets, not Internet Protocol packets—they would need to be sent from within the local wireless LAN, or from the Internet service provider’s equipment. But they could be sent out from an ISP as a broadcast, essentially re-opening the backdoor on any customer’s router that had been patched."
http://www.synacktiv.com/ressources/TCP32764_backdoor_again.pdf
http://arstechnica.com/security/2014/04/easter-egg-dsl-router-patch-merely-hides-backdoor-instead-of-closing-it/
https://github.com/elvanderb/TCP-32764
Tableau de comparaisons de différents modems/routeurs
Having previously reversed their firmware obfuscation and patched their code to re-enable JTAG debugging, I thought that surely I would be able to use this access to reverse the new encryption algorithm used to secure their backup configuration files.
Se ha publicado una vulnerabilidad para el router modelo ZXV10 W300 V2.1 de la marca ZTE, más conocido aquí en Perú como "El Portaretratos" por su singular apariencia. Esta vulnerabilidad permite acceder a la configuración del router con permisos de administrador a través del servicio telnet.
Eloi Vanderbéken recently found a backdoor on some common routers, which is described on his GitHub here. Basically, a process that listens on the 32764 TCP port runs, sometimes accessible from the WAN interface. We scanned the v4 Internet to look for the routers that have this backdoor wild open, and gathered some statistics about them. We will also present a way to permanently remove this backdoor on Linksys WAG200N routers.
Note that despite this backdoor allows a free access to many hosts on the Internet, no patch is available as it is not maintained anymore. So we thought about some tricks combined with our tools to imagine how to fix that worldwide.
This backdoor doesn't have any kind of authentication and allows various remote commands, like:
remote root shell
NVRAM configuration dump: Wifi and/or PPPoE credentials can be extracted for instance
file copy
Let's see how many routers are still exposed to this vulnerability, and propose a way to remove this backdoor.
Some random code/data about the backdoor I found in my Linksys WAG200G (TCP/32764). If you don't understand something or want some details, feel free to fill an issue.
The backdoor may be present in other hardware, I'll update this readme accordingly :)
Possible fix :
if it's listening on the internet: add a firewall rule in the web UI (https://twitter.com/domainzero/status/419146140999626752)
Probable source of the backdoor:
SerComm https://news.ycombinator.com/item?id=6998258 (nice finding :) )
Backdoor LISTENING ON THE INTERNET confirmed in :
Netgear DG834B V5.01.14 (https://twitter.com/domainzero/status/419133964528263169)
Backdoor confirmed in:
Linksys WAG200G
Netgear DM111Pv2 (https://twitter.com/eguaj/status/418143024019816448)
Linksys WAG320N (http://zaufanatrzeciastrona.pl/post/smieszna-tylna-furtka-w-ruterach-linksysa-i-prawdopodobnie-netgeara/)
Linksys WAG54G2 (https://twitter.com/_xistence/status/418616691040350208)
DGN1000[B] Netgear N150 (https://github.com/elvanderb/TCP-32764/issues/3)
NETGEAR DGN1000 (don't know if there is a difference with the others N150 ones... https://github.com/elvanderb/TCP-32764/issues/27)
Netgear DG834G V2 firmware 4.01.40 (thanks Burn2 Dev)
Diamond DSL642WLG / SerComm IP806Gx v2 TI (https://news.ycombinator.com/item?id=6998682)
Linksys WAG120N (https://twitter.com/p_w999/status/418856260973252608/photo/1)
Cisco WAP4410N (https://github.com/elvanderb/TCP-32764/issues/11#issuecomment-31492435)
Linksys WAG160n (https://twitter.com/xxchinasaurxx/status/418886166700507136)
LevelOne WBR3460B (http://www.securityfocus.com/archive/101/507219/30/0/threaded)
Netgear DGN3500 (https://github.com/elvanderb/TCP-32764/issues/13)
NetGear DG834 v3 (thanks jd)
Netgear DG834[GB, N, PN] version < 5 (https://github.com/elvanderb/TCP-32764/issues/19 https://github.com/elvanderb/TCP-32764/issues/25)
Netgear DGN2000B (https://github.com/elvanderb/TCP-32764/issues/26)
Linksys WRVS4400N (Firmware Version:V2.0.2.1) (https://github.com/elvanderb/TCP-32764/issues/29)
Lynksys WRT300N fw 2.00.17 (https://github.com/elvanderb/TCP-32764/issues/34)
NETGEAR JNR3210 (https://github.com/elvanderb/TCP-32764/issues/37)
Backdoor may be present in:
Netgear DG934 probability: 99.99%
Netgear WPNT834 (http://forum1.netgear.com/showthread.php?p=270354)
Netgear WG602, WGR614 (v3 doesn't work, maybe others...), DGN2000 (http://zaufanatrzeciastrona.pl/post/smieszna-tylna-furtka-w-ruterach-linksysa-i-prawdopodobnie-netgeara/)
Linksys WAG160N (http://zaufanatrzeciastrona.pl/post/smieszna-tylna-furtka-w-ruterach-linksysa-i-prawdopodobnie-netgeara/)
all SerComm manufactured devices (https://news.ycombinator.com/item?id=6998258)
Backdoor is not working in:
Netgear WGR614v7 (thanks "Martin from germany" [your e-mail doesn't work])
Netgear WNDR3700 (https://twitter.com/juliengrenier/status/418748575842304000)
Netgear CG3100 (https://github.com/elvanderb/TCP-32764/issues/6)
Netgear WGR614v9 (https://github.com/elvanderb/TCP-32764/issues/7)
Linksys WRT54GS v1.52.8 build 001 (thanks Helmut Tessarek)
Linksys WRT54GL(v1.1) Firmware v4.30.16
Netgear WGR614v3 (https://github.com/elvanderb/TCP-32764/issues/8)
Netgear WNDR4500 (https://twitter.com/TechnicalRah/status/418826996873834496)
Netgear WNDR4000 (https://github.com/elvanderb/TCP-32764/issues/10)
Netgear R7000 (https://twitter.com/LRFLEW/status/418856141032935424)
Netgear R6300 (https://github.com/elvanderb/TCP-32764/issues/15)
Netgear WN2500RP (https://github.com/elvanderb/TCP-32764/issues/15)
Linksys E3000 fwv 1.0.04 (https://github.com/elvanderb/TCP-32764/issues/16)
Netgear VMDG480 (aka. VirginMedia SuperHub) swv 2.38.01 (https://github.com/elvanderb/TCP-32764/issues/16)
Netgear VMDG485 (aka. VirginMedia SuperHub 2) swv1.01.26 (https://github.com/elvanderb/TCP-32764/issues/16)
Cisco E2000 fwv 1.0.02 (https://github.com/elvanderb/TCP-32764/issues/17)
Cisco Linksys E4200 V1 fwv 1.0.05 (https://github.com/elvanderb/TCP-32764/issues/18)
NETGEAR CG3700EMR as provided by ComHem Sweden (https://github.com/elvanderb/TCP-32764/issues/20)
Netgear RP614v[4,2] V1.0.8_02.02 (https://github.com/elvanderb/TCP-32764/issues/22 https://github.com/elvanderb/TCP-32764/issues/24)
Netgear DG834G v5 (manufactured by Foxconn as opposed to the previous versions, nice finding anthologist https://github.com/elvanderb/TCP-32764/issues/28)
NETGEAR WNR3500Lv2
WRT320N (https://github.com/elvanderb/TCP-32764/issues/31)
Netgear DGND3700 (https://github.com/elvanderb/TCP-32764/issues/33)
Cisco WRVS4400N (https://github.com/elvanderb/TCP-32764/issues/36)
Some clarifications: I didn't want to lose my time in writing a full report, it's a very simple backdoor that really doesn't deserve more than some crappy slides. Moreover, my English is quite bad
I had a lot of fun in writing / drawing those slides, all the necessary informations are in them, if people don't understand them or find them "too full of meme" then - well - it's too bad for them :)
Quelle routeur est compromis ?
Au tour des netgear
Linksys est une société fondée en 1988 commercialisant des routeurs avec et sans fil ainsi que des cartes réseaux classiques ou au format USB. Linksys a été une des premières sociétés à utiliser la norme wifi 802.11g et c'est actuellement la société leader sur ce marché aux É.-U..
La plupart des produits Linksys sont plutôt destinés aux particuliers ou aux petites entreprises. En 2003, Cisco Systems a racheté Linksys et a fait de cette société une filiale spécialisée dans les équipements réseaux et VoIP pour le SOHO.
Voici une première version de l'introduction aux routeurs de type IOS.
There are numerous Linux distributions focused on small network routers; most of them are ultimately derived from the WRT54G source that was extracted from LinkSys some years ago.
OpenWrt is described as a Linux distribution for embedded devices.