Router Charts

Router Charts

Router Ranker

Router Ranker

Router Chooser

Router Chooser

NAS Charts

NAS Charts

NAS Ranker

NAS Ranker

More Tools

More Tools

Security Features

Is Your Router One In A Million?You may have seen a Forbes article about the security exploit described in a Black Hat How to Hack Millions of Routers talk. But there is no need to panic.

Andy Greenberg's Forbes article does a nice job of raising the red flag about a security issue that may still be lurking in many old routers sitting out there in the cloud.

The exploit that will be described in Craig Heffner's Black Hat talk at the end of this month uses a DNS rebinding technique to redirect a web page to a vulnerable router's web-based administration interface.

It's important to note that the vulnerability being demonstrated in the talk is DNS rebinding. Routers just happen to be an attention-grabbing subject. As Heffner explained in this pfsense forum thread:

While my talk is focused on attacking routers, there is no exploit in any router per-se, and it is not necessarily restricted to attacking routers. The exploit is DNS rebinding, which circumvents the same-origin policy in a client's Web browser by exploiting the trust inherently placed in the DNS protocol.

Also note that the talk summary clearly states that this only provides access to the router's administrative interface; an attacker would still need to exploit the router or log in to it via default/weak credentials in order to do anything.

The Google Docs spreadsheet below containing the routers tested by Heffner shows relatively old routers that were vulnerable to the exploit (Successful = Yes). But of particular note is that DD-WRT V24 and OpenWRT Kamikaze r16206 are both vulnerable.

Whether or not your router is on the list, there is one simple way to lower your chances of being a victim of this exploit—change your router's admin password to a strong one.

If you're really into the subject, you might want to read an 2008 paper by Heffner and Derek Yap, Security Vulnerabilities in SOHO Routers. It describes the many vulnerabilities that still can be found in many routers.

More Stuff

Win This!

TP-LINK Archer C9 AC1900 Router

 

You could win a TP-LINK Archer C9 AC1900 Router

Learn How!

Top Performing Routers

AC3200
AC2350
AC1900
AC1750
AC1200

Top Performing NASes

NoRAID
RAID1
RAID5

Over In The Forums

Highlights of this release: Official support for the RT-N16 is being dropped. This last model based on SDK5 requires too much efforts to maintain. New features such as the...
Asus RT-N66U Firmware version 3.0.0.4.376.3861 1. Upgrade OpenSSL library to 1.0.0q 2. Fixed CVE-201301813 3. Fixed the XSS vulnerability on page Main_Analysis_Content.asp 4. Added Movistar profile in IPTV setting page [EDIT] It has the same...
Hi, am looking to replace my RT-AC66U router and do not need a wireless router at this location. Would move the AC66u into a wireless AP role. Since I have...
I have had this new router for 6 days now and thought I would post some initial impressions and issues I have found so far. I bought from Fry's Electronics after...
I used to be in the computer business but I'm now medically retired however a Dr. Friend asked me for some help I thought I would post here to...