Netcore routers contain backdoor

A password "embedded" in the firmware of some routers (Netcore routers) manufactured in China offers attackers the ability to bypass and access the device's security in order to execute arbitrary code.

Ο ς δικτύωσης δεν είναι άλλος από το μηχάνημα που μεσολαβεί μεταξύ του υπολογιστή σας και της τηλεφωνικής γραμμής σας, και που πλασάρεται στην αγορά της Κίνας με το όνομα του Netcore, αλλά πωλείται επίσης και σε άλλα μέρη του κόσμου όπως στις ΗΠΑ με την επωνυμία Netis.
1239637340_701

Ερευνητές στο Trend Micro παρατήρησαν ότι οι μπορούν να παρέχουν εξωτερική πρόσβαση μέσω της ανοικτής UDP 53413, από οποιαδήποτε διεύθυνση IP. Επιπλέον, ο κωδικός πρόσβασης που είναι ενσωματωμένος στο firmware επιτρέπει τη σύνδεση στη συσκευή.

Mr. Tim Yeh, a security researcher, says that the password can not be changed and offers a way to hack into any intruder who knows the "secret" string. The same code appears to apply to all Netcore / Netis products.
Netcore

Caution
In Greece, the Netcore router does not seem to be on the shelves of one of the distributors, but if you look well you will find them on the shelves. So, you have checked if the 53413 door is open and if so then change it immediately.

Mr Yeh Tim says in blog of Trend Micro: “Almost all Netcore / Netis routers seem to have this vulnerability issue, based on that were examined. A large number of users affected by the vulnerability seem to be concentrated in China, where experts have identified more than two million IP addresses with the aforementioned UDP port open. However, they also found vulnerable devices in Taiwan, South Korea, Israel and the United States, albeit in much smaller numbers. The risk to users is that cybercriminals aim to upload, download and execute files on the routers. And what this means is that the device will be under the attacker's control, leaving its owner exposed to man-in-the-middle (MITM) attacks. MITM is a technique used by today's sophisticated malware to intercept and read communication between the client and the server, even if it is running over a secure connection.”

It is not very difficult for a hacker to exploit this router defect, as a simple port scan can reveal open UDP ports and therefore those who use such vulnerable tools.

Trend Micro also discovered that the configuration file containing the credentials for the web-based console router was not equipped with any encryption protection, allowing an attacker to download it.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).