Josh Rehman wrote: > It's interesting, the advisory claims that this can be exploited even > when remote admin is disabled. I tried to break my own router with their > advice, but it didn't work. (Maybe a kind soul has already cracked my > router and updated my firmware for me? :-) > > Presumably you can reset the password with this: > http://192.168.1.1/Gozila.cgi?setPasswd=hola&RemoteManagement=1&.xml=1 > > (replace the ip with the ip of your router's local interface) but this > didn't do nuttin for me... > > That's good news. > > I think.
If that worked from the LAN side, it would be bad but not catastrophic. If that worked from the WAN side, it would be catastrophic. Of course, even from the LAN side, if someone can get into your system through a forwarded port (say, cracking your web or mail server, or getting into a shell via ssh), then it trivially becomes remotely exploitable. Craig
msg18439/pgp00000.pgp
Description: PGP signature