[MLB-WIRELESS] Netgear WG602 AP backdoor admin account

Johnno fromjohnno at hotmail.com
Mon Jun 7 20:31:07 EST 2004


OH goody!, now everyone knows how to hack my AP!....errrr

John

----- Original Message ----- 
From: "Chris Samuel" <chris at csamuel.org>
To: <melbwireless at wireless.org.au>
Sent: Sunday, June 06, 2004 10:23 AM
Subject: [MLB-WIRELESS] Netgear WG602 AP backdoor admin account


> -----BEGIN PGP SIGNED MESSAGE-----
>
> Posted on the Bugtraq list, reference on /.
>
> http://www.securityfocus.com/archive/1/365069
>
> "The webinterface which is reachable from both interfaces (LAN/WLAN)
> contains an undocumented administrative account which cannot be disabled."
>
> "A search on Google revealed that "5777364" is actually the phonenumber
> of z-com Taiwan which develops and offers WLAN equipment for its OEM
> customers."
>
> "Systems Affected
> - ----------------
>
>         Vulnerable (verified)
>                 WG602 with Firmware Version 1.04.0
>
>         Possibly vulnerable (not verified)
>                 WG602 with other Firmware Versions
>                 WG602v2
>                 All other z-com derived WLAN Accesspoints"
>
> - -- 
>  Chris Samuel  :  http://www.csamuel.org/  :  Melbourne, VIC
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.0.7 (GNU/Linux)
>
> iQEVAwUBQMJkB41yjaOTJg85AQGtOQf/bGI2/1jr7VkSVG0cTsWqUMVXm7i8Qs/J
> Ta80ruGOwxwdqkZwLmk6jR+V79cfOemcDAGousioH8prW2pV3MewS7wZhlJ//g0A
> 9/3tWrWheqryDCLrW7sIy7f+WywMuhit2xpD6G47pv5VWhdRZbbp9bZTt8KooHk3
> xiJ1zA2QoCPs8Y60l3qvCf1o7u2e5TvtrJ9F4HF21mGKZSbpPchMFiCEETD6KsfG
> RQ6ossppzmxQ5CE7Vb6m39BC+wvRLFgVKSdUTZNALGhqmPOVCDF1XQYm+oQcUR/V
> Ji4vwbgsVRFba4wp/PbNvHgGpNOAbF+QiYfOHqYBJ38aCOttxq4A0w==
> =Zyo0
> -----END PGP SIGNATURE-----
>
> To unsubscribe: send mail to majordomo at wireless.org.au
> with "unsubscribe melbwireless" in the body of the message
>
>

To unsubscribe: send mail to majordomo at wireless.org.au
with "unsubscribe melbwireless" in the body of the message



More information about the Melbwireless mailing list