BugTraq
Asus AAM6000EV ADSL Router Wide Open Jul 14 2003 06:45PM
cw (security fidei co uk) (2 replies)
Re: Asus AAM6000EV ADSL Router Wide Open Jul 15 2003 02:16PM
Michael Renzmann (security dylanic de)
Re: Asus AAM6000EV ADSL Router Wide Open Jul 15 2003 01:01PM
Ben Wheeler (jammin life eu org) (2 replies)
Re: Asus AAM6000EV ADSL Router Wide Open Jul 15 2003 10:44PM
cw (security fidei co uk)

Hi all,
I was looking into the info provided by Michael Renzmann where he said:

"The same data can be accessed by telnetting to the device and choosing
the menu-path "System Maintenance / User Maintenance / List User" (6/5/4)."

On the AAM6000EV, the "User Maintenance" option is not under System Maintenance and I haven't spotted it anywhere else (though I haven't searched in depth).

What I did notice was that after using the web vulnerability to get the router username and password, an attacker could then go on to get the username and password for the internet account that the router is configured to use, hence potentially giving access to email and other services.

Use the menu path "System Maintenance > View All Configuration" (6,1)

Scan through the output for the following section:

Module 'ppp':

Then look for the following line

1 welogin username password logintype

In the UK this can be very useful. People using BT ADSL will have a username that is username (at) domain (dot) tld [email concealed], for example a Freeserve user would likely be username (at) freeserve.co (dot) uk [email concealed]

So not only does this allow you to get router access, but further poor configuration allows you to get all the details you need to access the hosts internet account.

[ reply ]
Re: Asus AAM6000EV ADSL Router Wide Open Jul 15 2003 01:50PM
cw (security fidei co uk) (1 replies)
Re: Asus AAM6000EV ADSL Router Wide Open Jul 16 2003 06:17AM
Michael Renzmann (security dylanic de)


 

Privacy Statement
Copyright 2010, SecurityFocus