exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

3Com Router Authentication Bypass

3Com Router Authentication Bypass
Posted Feb 9, 2009
Authored by Luca Carettoni | Site ikkisoft.com

The 3Com OfficeConnect wireless cable/dsl router suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | aa080901b45cce39e49530c28026faaa434bace8effcbd668c55029fb4655d06

3Com Router Authentication Bypass

Change Mirror Download
Security Research Advisory

Vulnerability name:
"3Com OfficeConnect Wireless Cable/DSL Router Authentication Bypass"
Advisory number: LC-2008-05
Advisory URL: http://www.ikkisoft.com

1) Affected Hardware/Software

* 3CRWE554G72
(Hardware version: 3COM_AP51_v01, Software version: 1.2.0 - Nov 14,2006)

Product URL:

Other recent versions, as well as similar 3Com devices, may be affected
due to the shared firmware code base.

2) Severity

Severity: Medium
Local/Remote: Remote

3) Summary

"The 3Com OfficeConnect Wireless Cable/DSL Router is a high-speed, affordable,
and easy-to-use small office solution that lets wireless and wired PCs and
laptops securely share a single broadband Internet connection."

This device is very common due to the affordable price and versatility.
For these reasons it is widely installed by large telecom providers in all Europe
(e.g. In Poland, Orange is currently deploying this device for its residential DSL).

This device is prone to an authentication bypass vulnerability which permits
to retrieve the complete system configuration as well as the services
credentials (e.g. web console, wifi network).

4) Vulnerability Details

The 3Com OfficeConnect Wireless Cable/DSL Router suffers an authentication
bypass vulnerability due to an improper authentication/authorization mechanism.

In order to manage the device, an easy to use web console is enabled by default
from the internal network and (optionally) from the Internet.
Even if the http daemon does not permit to access HTML pages and the web console
without authentication, it is still possible to invoke and execute
existent CGI programs. Unfortunately, the "System Tools-->Configuration-->Backup
Configuration" functionality saves the actual system configuration in a
persistent plain-text file named "config.bin" using a custom CGI program.
An unauthenticated user may directly invoke the "SaveCfgFile" CGI program and
easily download the system configuration containing configuration information,
users, passwords, wifi keys and other sensitive information.

Note: if the "Remote Administration" option is enabled, this vulnerability may
be exploited from the Internet as well.

Example of sensitive content within the "config.bin" file:

Later on, looking for similar vulnerabilities in the Bugtraq database,
I've found a similar finding discovered by Patrik, cqure.net
(iDEFENSE Security Advisory 01.20.05). As far as I know and I can understand
from the firmware versions reported, this issue seems to be a further
authentication bypass technique due to an insufficient patch supplied
by the vendor.

5) Exploit

Attackers may exploit this flaw through a common web browser.


6) Fix Information

To reduce the overall exploitability, disable the "Remote Administration"
option. However, a firmware update is required in order to resolve this issue.

7) Time Table

08/12/2008 - Vendor notified via "3Com Vulnerability Disclosure Form"
??/??/???? - Vendor response.
??/??/???? - Vendor patch release.
09/02/2009 - Public disclosure.

8) Credits

Discovered by Luca Carettoni - luca.carettoni[at]ikkisoft[dot]com

9) Legal Notices

The information in the advisory is believed to be accurate at the time of
publishing based on currently available information.
This information is provided as-is, as a free service to the community.
There are no warranties with regard to this information.
The author does not accept any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
Permission is hereby granted for the redistribution of this alert, provided
that the content is not altered in any way, except reformatting, and that due
credit is given.

This vulnerability has been disclosed in accordance with the RFP
Full-Disclosure Policy v2.0, available at:

Login or Register to add favorites

File Archive:

September 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    23 Files
  • 2
    Sep 2nd
    12 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    10 Files
  • 6
    Sep 6th
    8 Files
  • 7
    Sep 7th
    30 Files
  • 8
    Sep 8th
    14 Files
  • 9
    Sep 9th
    26 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    5 Files
  • 13
    Sep 13th
    28 Files
  • 14
    Sep 14th
    15 Files
  • 15
    Sep 15th
    17 Files
  • 16
    Sep 16th
    9 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    12 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    13 Files
  • 23
    Sep 23rd
    12 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    30 Files
  • 27
    Sep 27th
    27 Files
  • 28
    Sep 28th
    8 Files
  • 29
    Sep 29th
    14 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By