Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Hacking the D-Link DIR-890L (devttys0.com)
76 points by zdw on April 11, 2015 | hide | past | favorite | 15 comments


I used to write reviews on these consumer-level network devices and in my experience they nearly all ran a root-privileged server under Linux. Inevitably they would end up having some sort of cgi interface that would take in parameters and make a "system" call to do email, change configurations, etc. It was only a matter of how much time and effort I wanted to put in to show that I could break in by screwing with the variables. They also would always have an unused telnet or ssh server that was left over from the original developers. Lesson-learned - Don't ever enable remote access for these cheap consumer devices.

Edit: Remembered an amusing case where I reported a vulnerability to a manufacturer. I reported something like "If you add an administrator's email address to the device that looks like 'myemail`reboot`@gmail.com' the box will reboot". The manufacturer got right on it and "fixed" the bug. Their fix? The new firmware had an explicit check for the string "reboot" inside of submitted email addresses. Kind of tells you the quality of engineers they have developing these things...


I think the problem is that the typical engineers that work on these devices are used to work on a whole different layer - hardware. But they know how to put together a few simple CGI scripts and probably don't even know the dangers they are facing when they run HTTP(s) server.

So on the one side you have HW guys saying "no need to find someone, we can do it ourselves" and on the other managers gladly accepting this on face value (it probably does cost them less in the short run). I am not saying these guys are not good engineers, just that this is not their area of expertize. Their mistake is not realizing this.


I've worked in embedded devices, and the problem isn't that the engineers don't know how to fix it properly, it's just that nobody cares enough to make consumer-level devices very secure. That costs money.


I wonder if there's a buffer overflow in there too - how long is the command buffer and what's the maximum size of that header...?

From personal experience, SOAP is one of those protocols that feels massively overdesigned and unnecessarily bloated.


This. The minute I read "SOAP" I imagined the fault lies there. It probably does, but this was lower hanging fruit... :)


As crappy as this firmware is, the ones ~7-10 years ago that didn't run Linux were much worse!


Definitely need more posts/articles like that.

Sometimes publicity is the most efficient way to eradicate vendor' sloppiness and ignorance.



Some Netgear routers even have a built-in (root) telnet server and a command to dump the admin password.

https://ian.sh/blog/2014/10/18/netgear-wndr4000-security/


tl;dr: You can pass an arbitrary string to system on the router, thereby popping a de facto root shell using telnet. This owns the network.


tl;dr: but only if you're inside the lan or your target has enabled remote administration.


It looks like it could be done with a DNS rebinding attack (as you need to set a special HTTP header, so normal CSRF stuff doesn't work). This would mean the victim would simply need to visit an attacker controlled webpage


Sweet, even better. Is there any mitigation for that?


Sure! Install OpenWRT or some other alternative firmware.


just make user click your crafted link, "she put it in her mouth and you wont believe what happened next!"




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: