Linksys WAP610N has Unauthenticated Root Console issue

Published: 2011-02-10. Last Updated: 2011-02-10 04:04:54 UTC
by Chris Mohan (Version: 1)
1 comment(s)

Passed to the Internet Storm Center from Jim.

Linksys wireless access point (WAP610N) has an unauthenticated root console issue  

Taken from the actual advisory

*** SUMMARY ***

Linksys WAP610N is a SOHO wireless access point supporting 802.11n draft.

Unauthenticated remote textual administration console has been found that allow an attacker to run system command as root user.

Full details can be found here: http://www.securenetwork.it/ricerca/advisory/download/SN-2010-08.txt

This issue was also posted to the Full Disclosure mailing list http://seclists.org/fulldisclosure/2011/Feb/228

 

Chris Mohan --- ISC Handler on Duty

1 comment(s)

Comments

wow, wide open.. I happened to have a few of these in my office new in the box. Just tested a direct telnet connection to 1111 and dropped into a UID0 shell, no password required.

Diary Archives