Security researcher Kyle Lovett has uncovered a serious security flaw in some ADSL routers given to customers by ISPs, which leaves them vulnerable to remote hacking. These routers have been distributed in countries such as Colombia, India, Argentina, Thailand, Moldova, Iran, Peru, Chile, Egypt, China and Italy. Some of them were also found in the U.S. and other countries, although in those locales they were sold as off the shelf products, rather than being distributed by the ISPs.
The flaw that allows for the hacking to happen is called a "directory traversal" and appears in the router firmware component called webproc.cgi. The attackers can extract a config.xml file which contains the router's configuration settings, including the administrator's password hashes (which can be easily cracked due to the weak hashing algorithm being used), the ISP connection username and password, the Wi-Fi password, and the client and server credentials for the TR-069 remote management protocol used by some ISPs.
Lovett found the vulnerability in his spare time when he was analyzing an ADSL router a few months ago. He investigated this issue further and found that over 700,000 routers, which included multiple models, were vulnerable to the same security flaw.
The identified router models were:
ZTE H108NZTE H108NV2.1D-Link 2750ED-Link 2730UD-Link 2730E Sitecom WLM-3600Sitecom WLR-6100Sitecom WLR-4100 FiberHome HG110Planet ADN-4101Digisol DG-BG4011NObserva Telecom BHS_RTA_R1A
Lovett found that all of these routers had something in common: the vast majority of the routers were using firmware from the Chinese company called Shenzhen Gongjin Electronics, which also does business under the trademark T&W. This company manufactures networking equipment for router vendors such as D-Link, Asus, Alcatel-Lucent, Belkin, ZyXEL and Netgear.
It's not clear whether Shenzhen Gongjin Electronics even knows about this vulnerability in its firmware at this point in time, or whether it has already patched the firmware and has sent an updated version to its router vendor customers. The researcher has already notified the makers of the routers in which he personally found the vulnerability. He disclosed this vulnerability on Wednesday, at a security conference in UK, which focuses on finding vulnerabilities in embedded devices such as routers, network attached storage appliances, IP cameras and so on.
Follow us @tomshardware, on Facebook and on Google+.
Or if they put it there themselves.
You would point your browser to the IP address of the router and that would open the router's homepage. Of course there you were required to login and most users would have set up passwords. If you deleted the last part of the homepage URL (which was the filename of the actual html file loaded), you would end up in the parent directory. There, you would see other pages from the interface but most would show error 401. Most, except the page that contains the "upgrade firmware" and "backup/restore settings" command buttons. You pressed the backup button and voila! You had an .xml file with all the settings of the router. In those days, some routers would even show passwords in plaintext in the .xml file. You would see everything from admin passwords, ISP passwords, port forward settings, services used etc.
Even then that struck me as weird because I remembered that flaw from the Netscape browser back in 1999 when we used to do that in many many sites and have fun discovering all sorts of folders and files behind them. I simply cannot believe it is still here in 2015. It's either criminal negligence, or just plain criminal ;)
Cool story, bro.
Damn the Chinese..always one step ahead of us! Though the US is trying hard to do the same thing...