Backdoor Discovered In Netgear and Linkys Routers

From: Rod 
 From Slashdot:"A hacker has found a backdoor in the Linksys WAG200G  
router, that gives access to the admin panel without authentication.  
Further research shows that these devices are made by Sercomm, meaning  
that Cisco, Watchguard, Belkin and various others maybe affected as well.  
 From the article: 'The backdoor requires that the attacker be on the local  
network, so this isn’t something that could be used to remotely attack DSL  
users. However, it could be used to commandeer a wireless access point and  
allow an attacker to get unfettered access to local network resources.'"

Here is the original article.

Using Opera's mail client:

=============================================================== From: Dave Brockman ------------------------------------------------------ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Most Netgear products already listen for a magic packet to enable telnet. This exploit requires local (LAN not WAN) access, nothing special here for Netgear equipment. I believe every model tested successfully is also EOL from their respective manufacturer. Regards, dtb - -- "Some things in life can never be fully appreciated nor understood unless experienced firsthand. Some things in networking can never be fully understood by someone who neither builds commercial networking equipment nor runs an operational network." RFC 1925 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.17 (MingW32) Comment: Using GnuPG with Thunderbird - iQEcBAEBAgAGBQJSxhnDAAoJEMP+wtEOVbcdQ9AH/i5jl7Oj6zbSuIZHmFwdt7O5 0zu2P5M7ADdZ73dgAG3PDfSOZklzR6W+Af8dQSQDF0LcdpErkDEmBne+rrrKRxQs 099VD9qyRnUxaOnzwOqCWXJ3Lcvd4p4oJL1shEB6gLYzchU1J6oPRiyHWznvn0xz PExX04fl7q15NnMLuFYMdFWZ/ZArU1xI63pU9aZfQjBmoshkFAWP8cb8/2UIFcTz 1PkzD8ElBBy3+OSluXuTdATYb7CMYvylg/TRKQgjdn1vYKvnsQpotv4efgZUtDs3 QYLla0hO08EmRx8Kt2HjE8K0U24hChun2OeSLHFztnR9/91PPJxHr5isOyN5ug4= =kA3z -----END PGP SIGNATURE-----