[35176] in bugtraq
Re: Netgear WG602 Accesspoint vulnerability
daemon@ATHENA.MIT.EDU (Hostmaster)
Mon Jun 7 18:58:10 2004
Message-ID: <40C4188D.90005@neuemedien.net>
Date: Mon, 07 Jun 2004 09:26:05 +0200
From: Hostmaster <hostmaster@neuemedien.net>
MIME-Version: 1.0
To: bugtraq@securityfocus.com
In-Reply-To: <20040605192227.3189.qmail@www.securityfocus.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Hi,
Jaco Swart wrote:
> In-Reply-To: <Pine.GSO.4.33.0406031903380.14119-100000@shamal.khamsin.ch>
>
> I can confirm that this vulnerability still exists in the latest firmware upgrade(1.7.14) for the WG602. They've simply gone and changed the username to superman and password to 21241036.
yes - this is right (though it took me a while to find out how to get
this gzip compressed part out of the img).
Whats new in this image:
"[...] Fixed illegal user access the WEB configuration utility. [...]"
;-)
Would it be possible to change the firmware image by hand - e.g. usa a
hex editor and set this username / password to sth else?
regards,
Harald
--
Team NeueMedien.Net / Hostmaster