Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Router/Bridge/Hub)  >   Aztech Router Vendors:   Aztech System Ltd.
Aztech Router Lets Remote Users Access the Management Interface Via TCP Spoofing
SecurityTracker Alert ID:  1018641
SecurityTracker URL:
CVE Reference:   CVE-2007-4733   (Links to External Site)
Updated:  Apr 15 2008
Original Entry Date:  Aug 31 2007
Impact:   Host/resource access via network
Exploit Included:  Yes  
Version(s): DSL600EU
Description:   A vulnerability was reported in the Aztech DSL600 EU Router. A remote user can access the internal management interface.

In the default configuration, a remote user on the external interface can conduct a TCP spoofing attack to connect to the web-based management interface on the internal interface.

AchedDamiman reported this vulnerability.

Impact:   A remote user can access the internal management interface.
Solution:   No solution was available at the time of this entry.
Cause:   Access control error

Message History:   None.

 Source Message Contents

Subject:  Aztech router DSL600EU IP and ARP spoof

The Aztech DSL600EU is vulnerable to IP|ARP spoof.


Webinterface disabled in WAN to LAN or EXT to IN zone but the port 80 is not blocked, one malicious client can be send one SYN inundation
 and calculate the sequence number (IP spoof) and conect to the web interface.

By AchedDamiman


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC