WAP Backdoor

Configuration and operational information about stumbled AP's

WAP Backdoor

Postby sysadmn » Fri Jan 31, 2003 7:58 am

I stumbled across this on the Wardriving.Com blog. It's a couple of months old, but still (IMHO) newsworthy.

It seems that the OEM SW developer put a backdoor in their software. By sending the word "gstsearch" to a particular port, the WAP will reply with the WEP keys, mac filter settings, and admin password! It gets worse: this works from either the LAN or WAN interface! This definitely falls into the "WTF were they thinking?' category. Or did someone forget to #define before production release?

Nothing to worry about, unless your vendor bought this software. Anyone want to test the Linksys WAP11-V2.2?

http://archives.neohapsis.com/archives/bugtraq/2002-11/0008.html
Wigle Stats:
Total New Discovered Networks with GPS: 996
All Networks Recorded: 1,517
Networks This Month with GPS: 850
First Post: 26-Dec-2004
sysadmn
 
Posts: 124
Joined: Thu Jan 23, 2003 8:37 am
Location: in front of the computer, duh!

Postby Jaffo » Fri Jan 31, 2003 12:03 pm

Jaffo
Not everything that can be counted counts, and not everything that counts can be counted."
-- plaque on Albert Einstein's office wall
Jaffo
 
Posts: 43
Joined: Fri Dec 13, 2002 6:01 pm
Location: Colorado


Return to AP Information

Who is online

Users browsing this forum: No registered users and 2 guests