STE WILLIAMS

D-Link FINALLY slams shut ‘Joel’s backdoor’

5 ways to prepare your advertising infrastructure for disaster

Better late than never: D-Link has issued the promised patch that closes an administrative backdoor in its SOHO broadband routers.

When the vulnerability was first discovered, the vendor promised to patch it by the end of October.


The patch has now been issued here.

If an attacker set their browser user agent string to read xmlset_roodkcableoj28840ybtide, their D-Link router would obligingly drop them straight into the admin page without a login. Only turning off remote administration would protect the device.

An amusing and really obvious (except that Vulture South didn’t notice it either) aspect of the vulnerability is what happens if the secret string is reversed. As pointed out by Sophos at Paul Ducklin’s Naked Security blog, the string (ignoring the xmlset_ part) reads:

Edit by 04882 Joel Backdoor

In other words, in our opinion, someone dropped the backdoor into the device during development and forgot to remove it later. ®

Disaster recovery protection level self-assessment

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/12/04/dlink_finally_slams_shut_joels_backdoor/

Comments are closed.