Jump to content

Backdoor found in D-Link router

A developer at /DEV/TTYS0 downloaded firmware 1.13 for his DIR-100 revA and decided to reverse engineer it a bit. What he found appears to be a backdoor.

If you change your browser's useragent to "xmlset_roodkcableoj28840ybtide" without the quotes, you can access the web GUI of the router without having to type in a password or username. Basically, if you use a D-Link router's firmware which has this function, anyone can access your network and basically do anything to you (change password on the network and kick you out, redirect you to scam sites, monitor your traffic etc). If you read the user agent backwards it says "JoelBackDoor" so it's obvious that this was put in the firmware on purpose.

It seems like these models are affected:

  • DIR-100
  • DI-524
  • DI-524UP
  • DI-604S
  • DI-604UP
  • DI-604+
  • TM-G5240
  • BRL-04UR
  • BRL-04CW

But there is no telling if other routers has this as well. It's worth noting that this is an old firmware, but what makes me wonder is, why would they add this and if they used to add it in their old firmwares, are they adding it in their new ones as well?

So, what purpose do you people think this backdoor has and do you think other manufacturers and/or newer versions of the firmware also has backdoors like this? This is what worried me as soon as I started hearing about the NSA implementing backdoors into closed source software. If the backdoors are exposed, then even your average Joe could potentially wreak havoc on other peoples' equipment.

 

Source: /DEV/TTYS0

 

 

 

Some TP-Link routers also has a bug (not sure if this one is actually intended to be a backdoor like the D-Link one) which lets you remotely access the router with root privileges by sending a simple HTTP request which then starts a TFTP transfer from the host computer to the router, and then executes the file as root.

More info about that here: Sekurak

Link to comment
Share on other sites

Link to post
Share on other sites

The fact that it's called joelbackdoor makes it look like someone at D-Link decided to try and add a backdoor for their own purposes, without the company knowing. Says something for the people who check the code though if it was only found by someone who tried to reverse engineer their (compiled presumably) code and not their QA team.

HTTP/2 203

Link to comment
Share on other sites

Link to post
Share on other sites

there is an app available that lists all routers with such vulnerabilities  that make it easy to access most routers

 

if a person is this scared he can just install  tomato or dd-wrt

If your grave doesn't say "rest in peace" on it You are automatically drafted into the skeleton war.

Link to comment
Share on other sites

Link to post
Share on other sites

Christ I hope that this was not built into the routers on purpose. tbh I owned one years ago, never been a huge fan of D-Link, they gave me nothing but issues (mine and ones owned by friends of mine). Always been a netgear person myself but starting to think that a homemade open firmware one is best tbh

 

 

A group of embedded device hackers has turned up a vulnerability in D-Link consumer-level devices that provides unauthenticated access to the units' admin interfaces.

 
The flaw means an attacker could take over all of the user-controllable functions of the popular home routers, which includes the DIR-100, DI-524, DI-524UP, DI-604S, DI-604UP, DI-604+ and TM-G5240 units. According to the post on /DEV/TTYS0, a couple of Planex routers are also affected, since they use the same firmware.

 

Source:

http://www.theregister.co.uk/2013/10/13/dlink_routers_have_admin_backdoor/

Never trust a man, who, when left alone with a tea cosey... Doesn't try it on. Billy Connolly
Marriage is a wonderful invention: then again, so is a bicycle repair kit. Billy Connolly
Before you judge a man, walk a mile in his shoes. After that, who cares? He's a mile away and you've got his shoes. Billy Connolly
Link to comment
Share on other sites

Link to post
Share on other sites

So this backdoor is way more security breachy than the regular old username: admin - password: password

sysloc

Link to comment
Share on other sites

Link to post
Share on other sites

Already posted.

 

Yip, LAwLz beet me to it the fecker :P

 

https://linustechtips.com/main/topic/65239-backdoor-found-in-d-link-router/

Never trust a man, who, when left alone with a tea cosey... Doesn't try it on. Billy Connolly
Marriage is a wonderful invention: then again, so is a bicycle repair kit. Billy Connolly
Before you judge a man, walk a mile in his shoes. After that, who cares? He's a mile away and you've got his shoes. Billy Connolly
Link to comment
Share on other sites

Link to post
Share on other sites

How did they not patch this up? This is unacceptable.

A lot of routers are vulnerable to similar attacks, 2 wire had a big problem with them a while back and the local exploitation still exists. I have seen business grade routers vulnerable to simpler attacks that allow full admin access from a locally connected client. The best thing to do is to disable remote access and only manage from internally. 

 

although even disabling the remote management feature is not always enough https://forums.hak5.org/index.php?/topic/29775-cisco-linksys-ea-series-vulnerability/

Link to comment
Share on other sites

Link to post
Share on other sites

I usually install third party software like DD-WRT on routers because the stock firmware is sometimes not very good imo.

Hello and Welcome to LTT Forum!


If you are a new member, please read the rules located in "Forum News and Info". Thanks!  :)


Linus Tech Tips Forum Code of Conduct           FAQ           Privacy Policy & Legal Disclaimer

Link to comment
Share on other sites

Link to post
Share on other sites

About the TP-Link issue on the website it says "it is WAN exploitable if http admin is available from WAN side" does this mean if you have Remote Admin turned off it is not vulnerable?

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×