elvanderb / TCP-32764

some codes and notes about the backdoor listening on TCP-32764 in linksys WAG200G.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

netgear DG934G - vulnerable

jmgunn87 opened this issue · comments

below is the poc script output

probably not vulnerable (error: timed out)

although with telnet you get this

telnet 192.168.0.1 32764
Trying 192.168.0.1...
Connected to www.routerlogin.com.
Escape character is '^]'.

MMcS��Connection closed by foreign host.

I have been playing around with this in node here is a script, all commands are available to me (1-13)
https://gist.github.com/jmgunn87/8573239

Did you try to increase the timeout parameter?
The default is 1 second, it might cause some problems.

it was very late last night when I did this, I ran the script against the wrong ip address(the default is 192.168.1.1 mine is 0.1)! The script does indeed tell me I am vulnerable! Thanks for finding this exploit and sharing it, great work.