« "Los Pollos Hermanos" ransomware - what will they think of next? | Main | The FBI reported that a researcher hacked commercial plane causing it to “climb” »
Thursday
May212015

Gizmodo Posting describes Simple Security Flaw that opens up quite a few routers at risk…

imageView Gizmodo Post

SEC Consult Vulnerability Lab has discovered the flaw in a driver referred to as NetUSB. The driver, as its name suggests, is installed on routers to allow computers to access USB devices over a network.

The driver contains an error known as a buffer overflow, which can occur when a device sends its name to the router and it’s longer than 64 bytes. The researchers claim that the simple overflow can be used to crash the router, using denial of service of attacks, and even execute code remotely.

Among the Company’s products that are affected include Netgear, D-Link, TP-LINK, Trendnet, and Zyxel.

Solution: TP-LINK has started releasing fixed firmware. The status of affected products can be found in the affected product list above. For additional information also see CERT/CC vulnerability notice: http://www.kb.cert.org/vuls/id/177092

Workaround: Sometimes NetUSB can be disabled via the web interface, but at least on NETGEAR devices this does not mitigate the vulnerability. NETGEAR told us, that there is no workaround available, the TCP port can't be firewalled nor is there a way to disable the service on their devices.

Here is the link for SEC-Consult’s Report

PrintView Printer Friendly Version

EmailEmail Article to Friend

Reader Comments

There are no comments for this journal entry. To create a new comment, use the form below.

PostPost a New Comment

Enter your information below to add a new comment.

My response is on my own website »
Author Email (optional):
Author URL (optional):
Post:
 
Some HTML allowed: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <code> <em> <i> <strike> <strong>