Me no crazy, yes?Was just thinking.
The WAN exploit did give admin rights to the person who just logged in.
That means that he/she could have run "nvram show" ... and get the admin password for the router?
So I think it's time to change that one too...
I simply stick to a VPN tunnel for anything requiring access to home resources.
While on this, it should be noted that two separate audits will be done on OpenVPN 2.4's code. The final result should be really interesting.
No way to be sure until proven as such, but I suspect the same hole _should_ also exist in the stock firmware, since I've made it a point to never touch the authentication code in httpd, aside from the obvious security fixes (preventing visible buffer overruns, that sort of thing).
The dropbear flag issue mentioned in this thread are irrelevant to this issue. That port forwarding feature requires you to open an authenticated session, and it does not do what most people think it does (it's more of a port redirection than a port forward, really).
Agree, baidu is not a good website, for some reason, my Chinese IP camera was connecting to baidu.com thousands of times a month, I'm considering to throw that thing away. But for now, I have baidu in blacklist. I should also put hao123.com too. I'm curious why you put kapook.com to blacklist? Are there many things for entertainments there? Is it dangerous or just annoying? Btw, I live in the same province as you.Baidu.com is BAD! I blacklist baidu.com, hao123.com and kapook.com at a two sites I do volunteer IT support for. I have seen how the software teachers have downloaded from baidu.com can take over clients, even though it looks legit, such as an baidu branded anti-virus program. On my to do list is to get policy rules set up to lock things down.
I also doubt that RMerlin will be the cause of this. I also think that if I am running AsusWRT stock firmware, I wouldn't care whatsoever is in the changelog, or care if SSH setting has been changed, or even care opening WebUI.Just also want to go on record here that while the Asuswrt-RMerlin community noticed this potential risk first, I don't believe this was introduced by any changes that were added/changed - Rmerlin has been ahead of the factory firmware with finding and implementing fixes...
It's more about how advanced users are watching things more closely, and how they're using the device compared to the 'typical' user that just plugs it in, sets up the wifi, and goes about their business...
This is a good thing - if folks weren't watching, this issue could have gone unnoticed for a long time...
Change who sees the nvram entries or change the pw store location?Was just thinking.
The WAN exploit did give admin rights to the person who just logged in.
That means that he/she could have run "nvram show" ... and get the admin password for the router?
So I think it's time to change that one too...
The attacker, in my case, had access to my admin username/password as logged when they accessed SSH through WAN. There was no failed attempt at all, and username I use is not default "admin" either.Was just thinking.
The WAN exploit did give admin rights to the person who just logged in.
That means that he/she could have run "nvram show" ... and get the admin password for the router?
So I think it's time to change that one too...
My main concern is that there is an vulnerability in the default Asus login, enabling either bypassing it or disabling it completely. Too much coincidence that 4 users with not simple 123admin usernames and likewise passwords are hacked this way...The attacker, in my case, had access to my admin username/password as logged when they accessed SSH through WAN. There was no failed attempt at all, and username I use is not default "admin" either.
The vulnerability is implied with opening HTTP WAN access to the router GUI.My main concern is that there is an vulnerability in the default Asus login, enabling either bypassing it or disabling it completely. Too much coincidence that 4 users with not simple 123admin usernames and likewise passwords are hacked this way...
To be sniffed would require another breach somewhere on the network or when logging on through an unsecured hotspot. Possible, of course. But without that...The vulnerability is implied with opening HTTP WAN access to the router GUI.
One successful remote login of yourself is enough to have your credentials being sniffed and stored for malicious use.
I think one of the other three said that HTTP was never used. I also have not login to my router from WAN through HTTP, but in any case, I will just use OpenVPN.The vulnerability is implied with opening HTTP WAN access to the router GUI.
One successful remote login of yourself is enough to have your credentials being sniffed and stored for malicious use.
If they had disable it or bypass it, would they get our credential? In our cases, they got our credentials, not sure if it before being able to access router or after, by getting info from NVRAM, as when they access WAN SSH without making failing to login.My main concern is that there is an vulnerability in the default Asus login, enabling either bypassing it or disabling it completely. Too much coincidence that 4 users with not simple 123admin usernames and likewise passwords are hacked this way...
Do you want any logs or extra information from eddiez? He may have some useful information as he has not yet done factory reset. In any case, thanks for constantly improving both security and usability of firmware.The hole I fixed last night wasn't present in 380.64 (it was introduced with GPL 4180). I suspect there might be more than one issue at play here, since 4180 also fixed other issues. It's possible that both set of fixes might be needed.
The hole I fixed last night wasn't present in 380.64 (it was introduced with GPL 4180). I suspect there might be more than one issue at play here, since 4180 also fixed other issues. It's possible that both set of fixes might be needed.
The web gui log has not registered any failed or illogical login attempts (correct or incorrect ones). So they must have used the WAN exposure to enter, bypassing the login, after which they enabled SSH and by made sure the iptables rule cannot be deleted (easily) (ash).I think one of the other three said that HTTP was never used. I also have not login to my router from WAN through HTTP, but in any case, I will just use OpenVPN.
If they had disable it or bypass it, would they get our credential? In our cases, they got our credentials, not sure if it before being able to access router or after, by getting info from NVRAM, as when they access WAN SSH without making failing to login.
Do you want any logs or extra information from eddiez? He may have some useful information as he has not yet done factory reset. In any case, thanks for constantly improving both security and usability of firmware.
Yes.excuse my ignorance but after the hackers gain access to the router through WAN he then have access to the entire local network behind?
Do you want any logs or extra information from eddiez?
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!