[35176] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Netgear WG602 Accesspoint vulnerability

daemon@ATHENA.MIT.EDU (Hostmaster)
Mon Jun 7 18:58:10 2004

Message-ID: <40C4188D.90005@neuemedien.net>
Date: Mon, 07 Jun 2004 09:26:05 +0200
From: Hostmaster <hostmaster@neuemedien.net>
MIME-Version: 1.0
To: bugtraq@securityfocus.com
In-Reply-To: <20040605192227.3189.qmail@www.securityfocus.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

Jaco Swart wrote:

> In-Reply-To: <Pine.GSO.4.33.0406031903380.14119-100000@shamal.khamsin.ch>
> 
> I can confirm that this vulnerability still exists in the latest firmware upgrade(1.7.14) for the WG602.  They've simply gone and changed the username to superman and password to 21241036.

yes - this is right (though it took me a while to find out how to get 
this gzip compressed part out of the img).

Whats new in this image:
"[...] Fixed illegal user access the WEB configuration utility. [...]"

;-)

Would it be possible to change the firmware image by hand - e.g. usa a 
hex editor and set this username / password to sth else?

regards,

Harald

-- 
Team NeueMedien.Net / Hostmaster



home help back first fref pref prev next nref lref last post