Router D-Link several channels logged secret.

report analyzes the firmware of the router from D-Link web / dev/ttyS0 found in web server for the configuration is a strange string “xmlset_roodkcableoj28840ybtide” specified in the code. When analyzing the reverse: a browser’s User-Agent string that will take control of the router without login

from a string in the other. The firmware download. Found that the program “xmlsetc” for automatic configuration. We guess that the developers want to modify the configuration of the D-Link router’s Web. But because the web needs to be logged by the user. The developer chose to build a secret string to match the application and web server configuration

impact of design provides the ability to configure the system to hackers even change my password. This problem affects many routers. In the report the suspected impact include DIR-100, DI-524, DI-524UP, DI-604S, DI-604UP, DI-604 +, TM-G5240, BRL-04UR, and BRL-04CW between This is no other protection. Users should disable the WAN port configuration of the Wi-Fi service contact D-Link may have to wait for the update to fix the problem

Source – / dev/ttyS0



                     Security, D-Link


  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: