ExtremeHacking
Today : | Time : | safemode : ON
> / Main Website / Cyber Surakha Abhiyan / Hackers Charity / Linkedin / facebook / twitter /
Name Author Perms Com Modified Label

Linksys EA2700, EA3500, E4200, EA4500 Authentication Bypass Unknown rwxr-xr-x 0 2/25/2014

Filename Linksys EA2700, EA3500, E4200, EA4500 Authentication Bypass
Permission rw-r--r--
Author Unknown
Date and Time 2/25/2014
Label
Action
Ethical Hacking Institute in Pune
./Arizona Team

Vulnerable products : Linksys EA2700, EA3500, E4200, EA4500



























Vulnerability:
Due to an unknown bug, which occurs by every indication during the
installation and/or upgrade process, port 8083 will often open,
allowing for direct bypass of authentication to the "classic Linksys
GUI" administrative console for remote unauthenticated users.

If vulnerable, an attacker would have complete control of the routers
administrative features and functions.

On affected models by simply browsing to:

http://<IP>:8083/

a user will be placed into the admin console, with no prompt for
authentication. Moreover, by browsing to:

http://<IP>:8083/cgi-bin/

the following four cgi scripts (often there are more depending on the
firmware and model) can also be found.

fw_sys_up.cgi
override.cgi
share_editor.cgi
switch_boot.cgi

It has been observed that Port 443 will show as open to external scans
when the vulnerability exists, though not all routers with this open
port are affected. On the http header for port 8083, for those
affected, "Basic Setup" is the only item of note observed.

An end user should not rely on the router's GUI interface for the
status of remote access, as this bug is present when the console shows
remote access as disabled.

Timeline:
The vendor was first notified of this bug in July 2013, and several
follow-up conversations have occurred since that time.

Patches/Workaround:
No known patches or official fixes exist, though some workaround
fixes, including reinstallation of the firmware have been often shown to solve the issue. This is not an official workaround and it is strongly advised to contact Linksys support for additional
information.

Recommendations:

- Scan for an open port 8083 from the WAN side of the router to check
for this particular vulnerability.
- Since an attacker has access to enable FTP service, USB drives
mounted on those routers which have them, should be removed until an
official fix is out or vulnerability of the router has been ruled out.

www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, IT Security Training Information Security Traning Courses in Pune, ceh certification in pune, Ethical Hacking Course in Pune
 

Cyber Suraksha Abhiyan | Sadik Shaikh © 2015 Sadik Shaikh | CEH V9 | ETHICAL HACKING Course Training Institute in India-Pune
Extreme Hacking Template design by Sadik Shaikh | Cyber Suraksha Abhiyan