SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Device (Router/Bridge/Hub)  >   Aztech Router Vendors:   Aztech System Ltd.
Aztech Router Lets Remote Users Access the Management Interface Via TCP Spoofing
SecurityTracker Alert ID:  1018641
SecurityTracker URL:  http://securitytracker.com/id/1018641
CVE Reference:   CVE-2007-4733   (Links to External Site)
Updated:  Apr 15 2008
Original Entry Date:  Aug 31 2007
Impact:   Host/resource access via network
Exploit Included:  Yes  
Version(s): DSL600EU
Description:   A vulnerability was reported in the Aztech DSL600 EU Router. A remote user can access the internal management interface.

In the default configuration, a remote user on the external interface can conduct a TCP spoofing attack to connect to the web-based management interface on the internal interface.

AchedDamiman reported this vulnerability.

Impact:   A remote user can access the internal management interface.
Solution:   No solution was available at the time of this entry.
Cause:   Access control error
Underlying OS:  

Message History:   None.


 Source Message Contents

Date:  30 Aug 2007 23:10:01 -0000
Subject:  Aztech router DSL600EU IP and ARP spoof

The Aztech DSL600EU is vulnerable to IP|ARP spoof.

Example:

Webinterface disabled in WAN to LAN or EXT to IN zone but the port 80 is not blocked, one malicious client can be send one SYN inundation
 and calculate the sequence number (IP spoof) and conect to the web interface.

By AchedDamiman

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC