Netgear router version 1.0.0.24 with JNR1010 firmware suffers from a cross site request forgery vulnerability.
da6530ed94ec74ddcb325b48d68b02ef2fe16d9c6ec393e137a00d4987f9e68a
Alpha Networks ADSL2/2+ Wireless Router version ASL-26555 suffers from a remote administration password disclosure vulnerability. Tested on firmware version 2.0.0.30B_ES.
0acc750576387e5c5c8428df81f18e8f0e01592d9d5308c8ea0f94e991b8de78
Cisco Security Advisory - Cisco IOS XR Software contains a vulnerability when handling crafted packets that may result in a denial of service condition. The vulnerability only exists on Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP-4G and RSP-8G), Route Switch Processor 440 (RSP440), and Cisco Carrier Routing System (CRS) Performance Route Processor (PRP). The vulnerability is a result of improper handling of crafted packets and could cause the route processor, which processes the packets, to be unable to transmit packets to the fabric. Cisco has released free software updates that address this vulnerability.
bc07f2e416a80379a131e30d960f750f093f1907368c5841670468346b98ce8e
This is a multithreaded scanner that scans many ip addresses on a specified port simultaneously. It is very useful for finding insecure systems when used with such ports as 23 (Telnet) or 8080, which is the web interface for many routers. The author of this program takes no responsibility for the actions of its users.
8b00dfe8071bfc1a6b2d42de3eb31f6439e21d035b5ca397aa790740648b7fa1
OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.
118d79062dddb1318eb706054168ad17a030afe1e9ebb59f9dc7c7a7a03bc308
Secunia Security Advisory - A vulnerability has been reported in SEIL routers, which can be exploited by malicious people to bypass certain security restrictions.
2baea6eba9daa04dc1c6d1b6da284cb50f3878531e8f713e71366dc62c1456a8
This document specifies a mechanism that can be implemented in layer-2 devices to mitigate attack vectors based on Neighbor Discovery messages. It is meant to complement other mechanisms implemented in layer-2 devices such as Router Advertisement Guard (RA-Guard) and DHCPv6-Shield, with the goal of achieving a comprehensive IPv6 First Hop Security solution. This document is motivated by the desire to achieve feature parity with IPv4 with respect to First Hop Security mechanisms.
b0bd48d4dfcf7fc338169df812038a282998457c61b3f8cfb9294a669b43f80a
Cisco Security Advisory - Cisco IOS XR Software contains a vulnerability when handling crafted packets that may result in a denial of service condition. The vulnerability only exists on Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP440) and Cisco Carrier Routing System (CRS) Performance Route Processor (PRP). The vulnerability is a result of improper handling of crafted packets and could cause the route processor, which processes the packets, to be unable to transmit packets to the fabric. Cisco has released free software updates that address this vulnerability.
fff41f08fd976df15727676fbdf3534859a2336101b9fdcdc8160a445d8bf795
Secunia Security Advisory - A weakness has been reported in Belkin N150 Wireless Router, which can be exploited by malicious people to disclose sensitive information.
b6ed506051af274beab68af00bbd9ecab8ea6704351c271c2d0632fcbf57eff3
The Cisco Linksys WRT54GL router suffers from a cross site request forgery vulnerability.
15765a5278a3d85691a1560925b05f28f2c55ddd9ccac8024f86755afe32809a
Mikrotik Router suffers from a denial of service vulnerability.
f6813d43ca1accbc159ab893c70c7f6daf4eb163cd6482ab2eb09f4efb630784
Secunia Security Advisory - Ivano Binetti has reported a vulnerability in Sitecom WLM-2501 Wireless Modem Router 300N, which can be exploited by malicious people to conduct cross-site request forgery attacks.
c281578e7a42bdfd5e4a45774b36c15ba47c1372079325e32d799823eced520f
Cisco Security Advisory - Cisco IOS Software contains a denial of service (DoS) vulnerability in the Wide Area Application Services (WAAS) Express feature that could allow an unauthenticated, remote attacker to cause the router to leak memory or to reload. Cisco IOS Software also contains a DoS vulnerability in the Measurement, Aggregation, and Correlation Engine (MACE) feature that could allow an unauthenticated, remote attacker to cause the router to reload. An attacker could exploit these vulnerabilities by sending transit traffic through a router configured with WAAS Express or MACE. Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to cause the router to leak memory or to reload. Repeated exploits could allow a sustained DoS condition. Cisco has released free software updates that address these vulnerabilities.
788885399c203d07e2f188436e87b949677dbed1fe1b4f9d5901f2a746308dff
Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.
452514a1ec0be1416bfca93603e6c89deb91d1a3a19671c64b5a8868a3743daf
This Metasploit module exploits a vulnerability found in Lotus CMS 3.0's Router() function. This is done by embedding PHP code in the 'page' parameter, which will be passed to a eval call, therefore allowing remote code execution. The module can either automatically pick up a 'page' parameter from the default page, or manually specify one in the URI option.
9cfa92781759b0e3fca07d4e2381bdf31f60c42eb04c18946ce17fa3ef4f50c3
STKeyGen demonstrates how default WPA keys and default Administrator passwords are created on BT HomeHub 2 Type A router in the UK which are based on Technicolor/Thomson hardware.
7a2300ea3821865509d3b83255e03471dd1e303e529eeb8bcaa3a0382f92ed9c
The D-Link DSL-2640B ADSL router suffers from a simple authentication bypass vulnerability by spoofing the MAC address of a logged in administrator.
12bc1d6056d32882aa0e9cb89830f0cca2bd54029fb7e936e8201175dcf085f6
Mercurycom MR804 Router version 3.8.1 Build 101220 Rel.53006nB suffers from a denial of service vulnerability when fed multiple HTTP headers.
bcb466aefafb323238fa7776d12c39fca5da5fac0996900812c40f57e49cb5ef
The Cisco Linksys WAG54GS ADSL router suffers from a cross site request forgery vulnerability.
bfb35b1a670f2df0c8e171cb6cac8009146ebfef18fbcd82c5a7420cf409e60f
The Xavi 7968 router suffers from cross site request forgery and persistent cross site scripting vulnerabilities.
0c039e2b4d465e7ff02208af6529c8a0ca6aed64f68bf75e27e8e39625367265
The Xavi 7968 ADSL router suffers from a remote denial of service vulnerability.
8f3e5a0e91a14404590fc9a47db1d72e3bdb6016bb58863d753c1b975708c2b2
The D-Link DSL-2640B ADSL router suffers from a cross site request forgery vulnerability.
aef1b3315a162b05f5bead24ba69d1d330f330d4dc5f1ba5d7139ecbfb31f62c
Lightaidra is an IRC commanded tool that allows for scanning and exploiting routers. It also performs flooding.
e635493a0bb2cb118a4bfcf366984e92382fe1f4a65b187025ea0b667066c554
RouterDefense is a Cisco IOS security assessment tool. It deep dives into router and switch configurations and reports security recommendations.
56972eb98118ad770c4ed02dd83010c19471fb6183b5df9613c2e91576639a4f
Avaya WinPDM UniteHostRouter versions 3.8.2 and below remote pre-auth buffer overflow exploit that binds a shell to port 4444.
e60668fa5b27c23dd1c833eb25b44a403111b5eef0cdf05eb8fb7b3e13fe0967
IPv6 Extension Headers with Neighbor Discovery messages can be leveraged to circumvent simple local network protections, such as "Router Advertisement Guard". Since there is no legitimate use for IPv6 Extension Headers in Neighbor Discovery messages, and such use greatly complicates network monitoring and simple security mitigations such as RA-Guard, this document proposes that hosts silently ignore Neighbor Discovery messages that use IPv6 Extension Headers. Revision 2 of this document. This revision includes, among other things, a discussion of possible issues with SEND as a result of IPv6 fragmentation.
a8b7a492cc8ab102f8884547a7f042ea0e94a1cdbbad648050eb655bf675f524