Hi all,
I am running an RT-AC68U on 386.13 (latest available release). Recently I ran an external scan of the WAN interface and I found a number of ports publicly exposed.
Port 3394 - u2ec (USB printing?)
Port 5473 - u2ec
Port 7788 - cfg_server
Port 18017 - Asus wanduck (from what I have read, this is the service that gives you an error page when the wan link is down)
I can see all these services when I run netstat -a -p on the router, but when I look in iptables there are no rules to allow these ports from the WAN. Furthermore, I have turned off any services which may open ports - UPnP is disabled, and I have also confirmed that port forwarding, port triggers and DMZ are also disabled as well. I am running an openvpn server which exposes a port, and while that works it interestingly does not report as an open port in my scan.
There have been a few other posts over the years talking about something similar but nothing recently, and nothing definitive as to why this occurs. This looks like some sort of bug to me, but my first question is - can anyone else on the same version replicate this behaviour on the same firmware? My second question is - what is the potential risk from having these services exposed?
I am running an RT-AC68U on 386.13 (latest available release). Recently I ran an external scan of the WAN interface and I found a number of ports publicly exposed.
Port 3394 - u2ec (USB printing?)
Port 5473 - u2ec
Port 7788 - cfg_server
Port 18017 - Asus wanduck (from what I have read, this is the service that gives you an error page when the wan link is down)
I can see all these services when I run netstat -a -p on the router, but when I look in iptables there are no rules to allow these ports from the WAN. Furthermore, I have turned off any services which may open ports - UPnP is disabled, and I have also confirmed that port forwarding, port triggers and DMZ are also disabled as well. I am running an openvpn server which exposes a port, and while that works it interestingly does not report as an open port in my scan.
There have been a few other posts over the years talking about something similar but nothing recently, and nothing definitive as to why this occurs. This looks like some sort of bug to me, but my first question is - can anyone else on the same version replicate this behaviour on the same firmware? My second question is - what is the potential risk from having these services exposed?