[AusNOG] Port 32764 Remote Admin Vulnerability?
skeeve+ausnog at eintellegonetworks.com
Sat Jan 4 15:25:50 EST 2014
Won't take long to find them all.. only takes about 15 minutes to scan the
entire v4 internet with the right resources.
*Skeeve Stevens - *eintellego Networks Pty Ltd
skeeve at eintellegonetworks.com ; www.eintellegonetworks.com
Phone: 1300 239 038; Cell +61 (0)414 753 383 ; skype://skeeve
facebook.com/eintellegonetworks ; <http://twitter.com/networkceoau>
twitter.com/theispguy ; blog: www.theispguy.com
The Experts Who The Experts Call
Juniper - Cisco - Cloud - Consulting
On Sat, Jan 4, 2014 at 11:58 AM, Tim March <march.tim at gmail.com> wrote:
> On 4/01/14 2:18 AM, Brad Peczka wrote:
> > Evening all,
> > This cropped up on my radar this evening:
> > There's some better coverage in an Ars article here:
> > In a nutshell, it looks like there's an exploit in a range of Consumer
> and SOHO routers, whereby an unauthenticated administrative interface is
> listening on port 32764. Some models are only listening on the LAN
> interface, some models also listen to the WAN interface. On the right
> model, you can reset the username/password to one of your choosing and
> enable the remote administration interface.
> > Would be interesting to see if there's a notable uptick in port scans
> for this over the coming days... ;-)
> > Regards,
> > -Brad.
> > _______________________________________________
> > AusNOG mailing list
> > AusNOG at lists.ausnog.net
> > http://lists.ausnog.net/mailman/listinfo/ausnog
> PGP/GNUPG Public Key: http://d3vnu11.com/pub.key
> AusNOG mailing list
> AusNOG at lists.ausnog.net
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the AusNOG