-
Notifications
You must be signed in to change notification settings - Fork 223
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NETGEAR DGN1000 vulnerable #27
Comments
Thank you, I updated the list :) |
No, I don't, sorry: they are very likely to be the same. I've sent the issue message just to document also the firmware version. |
Ok, thank you :) |
Has anyone found a alternative firmware that can be applied. DD-WRT? Open WRT & Tomato don't have firmware for this router. I have tried to block the port using exiting firmware without success. |
I brought this issue up with netgear support (2014/01/17), and just in the last few days they have released a new firmware version that resolves the port 32764 issue. The new firmware is available on their website (http://downloadcenter.netgear.com/other/) I've confirmed that the below version works correctly. If the original backdoor was a planned 'feature', then its possible that there is a knocking sequence required to unlock port 32764 (that is, port 32764 opens after trying port 5000, then 8000 before 32764 as an example). |
I'll have a look, thank you :) |
Oh god :') |
I can confirm the vulnerability on this model (Firmware Version V1.1.00.46_ww).
Thank you for your work.
The text was updated successfully, but these errors were encountered: