TSTT Forum: DD-WRT httpd vulnerability (milw0rm.com report) - TSTT Forum

Jump to content

Page 1 of 1

DD-WRT httpd vulnerability (milw0rm.com report) Urgent notice to all DD-WRT users!

#1 User is offline   Lich King Icon

  • Telecom Master
  • PipPipPipPipPipPipPip
  • Group: Members
  • Posts: 767
  • Joined: 19-May 06

Post icon  Posted 22 July 2009 - 06:22 PM

DD-WRT httpd vulnerability (milw0rm.com report)

Ok basically there is a bug in http daemon which could be catastrophic because it allows remote root access to the router. Everyday Joe with a dynamic ip address won't really be at high risk but still you should update to the latest build. If you can't update at this time then implement the firewall rule in the proposed solutions for a quick fix.

The current latest build (build 12533) can be found here.

You can read more about the exploit on milw0rm.com.

Proposed solutions from dd-wrt.com:

Quote

The exploit can also be stopped, using a firewall rule: Go to your router's admin interface to > Administration > Commands and enter the following text:iptables -I INPUT -p tcp -m tcp -m webstr --url cgi-bin -j REJECT --reject-with tcp-reset press "Save Firewall" and reboot your router. This rule blocks any attempt to access sth that has "cgi-bin" in the url. You can verify that the rule is working by entering: http://192.168.1.1/cgi-bin/;reboot in your browser. That should give a "Connection was reset" (Firefox).

Important Note: This only works if HTTPS Management is not enabled in > Administration > Management > Remote Access. If that is not possible - PLEASE UPDATE.

0

Page 1 of 1


Fast Reply

  

1 User(s) are reading this topic
0 members, 1 guests, 0 anonymous users