On Thursday, October 17, 2019 05:25:46 AM to...@tuxteam.de wrote:
> On Thu, Oct 17, 2019 at 11:08:34AM +0200, to...@tuxteam.de wrote:
> 
> [...]
> 
> > [1] https://news.ycombinator.com/item?id=19507225
> 
> Sorry. That link forces you through Twitter. Here are better
> ones:
> 
>   https://old.lwn.net/Articles/784758/
>  
> https://www.bleepingcomputer.com/news/security/cisco-botches-fix-for-rv320
> -rv325-routers-just-blocks-curl-user-agent/

After readiing (or skimming, as the case may be), some of these links, I have 
a few reactions (after LMAO).

I am disappointed that this was not more widely publicized at the time (or 
even now) (I hadn't heard about it, or didn't understand it until now).

Cisco should be a laughingstock and in some kind of hall of shame based on 
what I've read.  ((Not) "fixing" a security problem by using a regex to prevent 
access to their routers via curl (while still allowing access (and the 
exploit) with any non-curl user string.

Reply via email to