What's new

Linksys-routers Vulnerable due to multiple cgi-scripts

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

tim

Regular Contributor
Sorry if this has been posted before. Didn't find it with a forum search.

From GURU3D http://www.guru3d.com/news-story/linksys-routers-vulnerable-due-to-multiple-cgi-scripts.html

Linksys routers ranging from model EA6100 up-to EA6300 are Vulnerable and exploitable due to multiple cgi-scripts. The scripts can be used by an unauthorized attacker, which can get them access to the master password of the device.

Linksys' EA6100-6300 wireless routers will need a patch reports the register: KoreLogic has published an advisory saying that CGI scripts in the admin interface open the device up to remote attackers. Since it's a consumer product the risk is high that most of the devices out there never would be patched. The bad scripts include the bootloader, sysinfo.cgi, ezwifi_cfg.cgi, qos_info.cgi and others.

The disclosure is attributed to Matt Bergin of KoreLogic. His proof-of-concept code provided with the advisory includes testing the target device to see if its admin password remains set to default. At the time of writing, Linksys has not published a fix, so it's at the very least recommended to shut down remote admin access to any devices you're in contact with.
 
Pretty much all Linksys routers using SmartWifi firmware are vulnerable because the guest network runs on an open SSID with no option to use security. The captive portal web daemon runs as root, so if a user can can crash or compromise the router via the guest network and web daemon, they'll have full control of the entire box.

SFX2000 first reported this to Linksys and that was several months ago. I wouldn't expect a fix honestly.

And the report in the OP probably isn't comprehensive enough - they only mention the EA6100 to EA6300. Both the EA6900 and WRT1900AC (I have owned both) run multiple CGI scripts and they can be executed from a web browser, such as sysinfo.cgi.
 
Pretty much all Linksys routers using SmartWifi firmware are vulnerable because the guest network runs on an open SSID with no option to use security. The captive portal web daemon runs as root, so if a user can can crash or compromise the router via the guest network and web daemon, they'll have full control of the entire box.

SFX2000 first reported this to Linksys and that was several months ago. I wouldn't expect a fix honestly.

The vuln I reported is specific to the Guest Network functionality, and it's pretty much broken on every linksys device I've tested against...
 

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top