• February 23, 2025, 12:23:52 PM
  • Welcome, Guest
Please login or register.

Login with username, password and session length
Advanced search  

News:

This Forum Beta is ONLY for registered owners of D-Link products in the USA for which we have created boards at this time.

Author Topic: D-Link Wireless Routers Are Susceptible To Network Intrusion  (Read 5036 times)

sda

  • Level 1 Member
  • *
  • Posts: 4

Dlink users might want to disable the authentication "security feature" of their routers - see below.
Dlink please read this, fix this problem and others associated with the 1.11 firmware.

May 16th, 2009

A new security feature added to some D-Link wireless routers actually makes users more susceptible to network intrusion, according to a hacker blog, which provides enough evidence to be taken seriously.
In response to the growing number of attacks and subsequent user security concerns, D-Link has integrated CAPTCHA - a system, designed to detect whether responses are human or computer-generated - into its popular home and small office routers as an extra safety measure. CAPTCHAs are used to prevent malicious software from performing actions that degrade the quality of service on a network, such as those found in worms, viruses and Trojan horses.
Manufacturer D-Link was still busy congratulating itself for adding a CAPTCHA designed to prevent malware bots from logging on to the devices when folks at the SourceSec Security Research blog showed how the upgrade could be manipulated to steal a WPA (or Wi-Fi protected access) password without even bothering to solve the test.
That’s because the new firmware logs in using a GET request containing a salted MD5 hash of the password, along with with input that’s unique to the CAPTHCHA image. It turns out all that’s required to access the router’s setup page is the hash, so the feature provides an easy way for anyone within range to access the panel that controls all kinds of sensitive settings and contains the WPA password.
What’s more, the new firmware allows even those with user-level access the ability to log in to the control panel, so an attacker need not have administrative credentials to perform the attack.
When we learned earlier this week that D-Link added the CAPTCHA to some of its home and office routers, we dismissed it as little more than a gimmick designed to lull inattentive consumers into a false sense of security. After all, it does nothing that couldn’t be achieved by taking 30 seconds to change the default password to a phrase that’s strong and unique.
Now we learn that it can actually make it easier for people within range to sneak into private sections of a network and uses the notoriously insecure MD5 hash to boot.
Credit: The Register
Logged

mikeny

  • Level 2 Member
  • **
  • Posts: 50
Re: D-Link Wireless Routers Are Susceptible To Network Intrusion
« Reply #1 on: July 15, 2009, 04:08:00 PM »

This was posted on here when it came out.  Old news.

http://forums.dlink.com/index.php?topic=5108.msg32393#msg32393 2nd post
« Last Edit: July 15, 2009, 04:12:06 PM by mikeny »
Logged

mavericken

  • Level 1 Member
  • *
  • Posts: 6
Re: D-Link Wireless Routers Are Susceptible To Network Intrusion
« Reply #2 on: July 16, 2009, 04:39:41 PM »

Can't see what the hacker could manage to do with it... not even I can open the ports on mine.
Logged

Fatman

  • Level 9 Member
  • ****
  • Posts: 1675
Re: D-Link Wireless Routers Are Susceptible To Network Intrusion
« Reply #3 on: July 16, 2009, 05:04:32 PM »

Can't see what the hacker could manage to do with it... not even I can open the ports on mine.

That just got the best laugh of the day!
Logged
non progredi est regredi

mikeny

  • Level 2 Member
  • **
  • Posts: 50
Re: D-Link Wireless Routers Are Susceptible To Network Intrusion
« Reply #4 on: July 16, 2009, 06:02:25 PM »

It might be worth mentioning again (since that was posted) that despite the warning, you really can't disable the authentication because you once you do, you can't log back in properly.  It'll keep prompting you for you the code, even though there is none.  You wind up having to reset to defaults and livng with the CAPTCHA.  This is one of the many problems in v.1.11 
Logged