elvanderb / TCP-32764

some codes and notes about the backdoor listening on TCP-32764 in linksys WAG200G.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

OpenWAG200

DuaneBarry opened this issue · comments

Vulnerable even with this installed http://sourceforge.net/projects/openwag200/files/OpenWAG200/1.4/
-download configuration with cleartext http admin password
-in shell with command "reboot" the router obeys
-work on WAN (Internet)

Interesting, thank you :)
I added it to the list, maybe OpenWAG200 is a little bit too open :P

UPDATE:
thanks of the ssh/telnet access present on OpenWAG200 and killing all of the processes called scfgmgr like you suggested in issue#61, the backdoor is not usable:

$ python poc.py --ip 192.168.200.253 --shell
probably not vulnerable (error: [Errno 111] Connection refused)

But the WebInterface become broken:
-the SETUP page is not complete
-the STATUS page display no information

This work for me

iptables -I INPUT -i ppp0 -p tcp --dport 32764 -j DROP

Maybe that's a little bit late, but i'd like to point out that the now dead openwag200g wasn't listening on the internet after all.
(snippet from original firewall script:
SYSLOG "# ------ [ Special Port Handling ] ------------------- #"
$IPTABLES -A INPUT_TCP -i $WANIF -m multiport -p tcp --dport 23,80,32764 -j DROP
)