elvanderb / TCP-32764

some codes and notes about the backdoor listening on TCP-32764 in linksys WAG200G.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

models vulnerable from the web

mandreko opened this issue · comments

I've been researching this backdoor, after seeing the excellent work done by Eloi. I found these models are working on the external wan interfaces, and have been able to get working shells on:

BSkyB DG934G
NETGEAR DG834
NETGEAR DG834
NETGEAR DG834G
NETGEAR DG834GT
NETGEAR DG834N
NETGEAR DG834PN
NETGEAR DGN1000
NETGEAR DGN2000
Honeywell WAP-PL2 IP Camera (I believe, but couldn't confirm model anywhere)

Models that I've found do not work from the wan interface, even though the port 32764 is open:
Linksys WAG120N
Linksys WAG320N
Linksys WAG54G2
Linksys WAG54G2B

Thank you but I won't update the readme.md anymore
It takes me to much time and I'm now back at work.
Could you please do a pull request?

I've got at least a strong reason to think that WAG120N can be accessed from the wan interface.

I have one DGN1000 device on hand ,but I can only access 32764 via LAN.
Is there any extra steps to access this from wan internet interface?

It may be specific firmware versions. I'll have to see if I can find my DGN1000 again, and get the version it was running.

So it could be accessed by default?
I got the version of my device, 1.1.00.48., FYI. :)

Hello Mandreko,
Could you let me know which device has been confirmed by you that could be access via WAN?
And luckily, my friend has other netgear devices , I will ask him for a trial.

My vulnerable DGN1000 is running firmware 1.00.41, and exposed to the WAN (I got the shell)

I downgrade my device to v41 , but failed to access 32764 from wan still. Seems wired , did you get reply on 32764 port from wan or you find any other funny way?

can anyone confirm ?

It's very interesting why this issue tracker isn't flooded with people asking more about the vulnerability :)

Any suggestions on securing old linksys modems? / Is this vulnerability exposed to external/internet somehow?

I've checked myself, the answer seems no, but I wanted to get the opinion of other watchers of the project

I've recently discovered our ISP segmenting modems based on their host names, which is usually the model name(could be for performance reasons, or technical reasons, yet it's very fishy, I'm afraid these backdoors might be mass-exploited by ISP's in their efforts to siphon as much as they can from citizens), which urged me to fix/patch issues to the furthest point, I would appreciate any advice