-
Notifications
You must be signed in to change notification settings - Fork 223
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
NETGEAR DGN1000 vulnerable #27
Comments
Thank you, I updated the list :) |
No, I don't, sorry: they are very likely to be the same. I've sent the issue message just to document also the firmware version. |
Ok, thank you :) |
Has anyone found a alternative firmware that can be applied. DD-WRT? Open WRT & Tomato don't have firmware for this router. I have tried to block the port using exiting firmware without success. |
I brought this issue up with netgear support (2014/01/17), and just in the last few days they have released a new firmware version that resolves the port 32764 issue. The new firmware is available on their website (http://downloadcenter.netgear.com/other/) I've confirmed that the below version works correctly. If the original backdoor was a planned 'feature', then its possible that there is a knocking sequence required to unlock port 32764 (that is, port 32764 opens after trying port 5000, then 8000 before 32764 as an example). |
I'll have a look, thank you :) |
Oh god :') |
I can confirm the vulnerability on this model (Firmware Version V1.1.00.46_ww).
Thank you for your work.
The text was updated successfully, but these errors were encountered: