ID

VAR-200409-0092


TITLE

Dynalink RTA 230 ADSL Router Default Backdoor Account Vulnerability

Trust: 0.9

sources: CNVD: CNVD-2004-2443 // BID: 11102

DESCRIPTION

Dynalink RTA 230 is a Linux-based ADSL router. The Dynalink RTA 230 has a default backdoor account that an attacker can use to control the entire ADSL device. According to the check /etc/passwd, you can find two default accounts: # cat /etc/passwd admin:xxxxx(obscured)xxxxx:0:0:Administrator:/:/bin/sh userNotUsed:YNf8oSCwK/0/Y:0: 0: Technical Support: /:/bin/sh These accounts cannot be modified and visible in the web configuration application. However, the WEB configuration application and the telnet service do not listen on the WAN interface by default. An attacker with access to the internal interface can fully control the ADSL device. Other devices that use similar firmware may also have this problem. Devices that may be affected by this vulnerability are: - US Robotics 9105 and 9106 - Siemens SE515 - Buffalo WMR-G54. It is reported that the firmware contains a backdoor account. This account is not visible or modifiable from the web administration interface

Trust: 0.81

sources: CNVD: CNVD-2004-2443 // BID: 11102

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2004-2443

AFFECTED PRODUCTS

vendor:nomodel: - scope: - version: -

Trust: 0.6

vendor:dynalinkmodel:rta adsl routerscope:eqversion:230

Trust: 0.3

sources: CNVD: CNVD-2004-2443 // BID: 11102

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2004-2443
value: HIGH

Trust: 0.6

CNVD: CNVD-2004-2443
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2004-2443

THREAT TYPE

network

Trust: 0.3

sources: BID: 11102

TYPE

Design Error

Trust: 0.3

sources: BID: 11102

EXTERNAL IDS

db:BIDid:11102

Trust: 0.9

db:CNVDid:CNVD-2004-2443

Trust: 0.6

sources: CNVD: CNVD-2004-2443 // BID: 11102

REFERENCES

url:http://lists.insecure.org/lists/bugtraq/2004/sep/0040.html

Trust: 0.6

url:http://dynalink.co.nz/products/rta230.htm

Trust: 0.3

url:/archive/1/374111

Trust: 0.3

sources: CNVD: CNVD-2004-2443 // BID: 11102

CREDITS

fabio <ctrlaltca@libero.it> disclosed this vulnerability.

Trust: 0.3

sources: BID: 11102

SOURCES

db:CNVDid:CNVD-2004-2443
db:BIDid:11102

LAST UPDATE DATE

2022-05-17T01:50:37.505000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2004-2443date:2020-03-10T00:00:00
db:BIDid:11102date:2004-09-03T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2004-2443date:2004-09-03T00:00:00
db:BIDid:11102date:2004-09-03T00:00:00