<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: D-link firewall teardown and vulnerability</title>
	<atom:link href="http://www.epanorama.net/blog/2013/10/15/d-link-firewall-teardown-and-vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2013/10/15/d-link-firewall-teardown-and-vulnerability/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 05 Apr 2026 13:29:12 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/10/15/d-link-firewall-teardown-and-vulnerability/comment-page-1/#comment-34576</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 15 Oct 2013 07:36:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=22412#comment-34576</guid>
		<description><![CDATA[Reverse Engineering a D-Link Backdoor
http://hackaday.com/2013/10/14/reverse-engineering-a-d-link-backdoor/

 He fired up binwalk to extract the SquashFS file system, then opened the router webserver on the multi-processor disassembler/debugger IDA. [Craig] discovered that the webserver is actually a modified version of thttpd, providing the administrative interface for the router. As you can see in the picture above, it seems Alphanetworks (a spin-off of D-Link) performed the modifications.]]></description>
		<content:encoded><![CDATA[<p>Reverse Engineering a D-Link Backdoor<br />
<a href="http://hackaday.com/2013/10/14/reverse-engineering-a-d-link-backdoor/" rel="nofollow">http://hackaday.com/2013/10/14/reverse-engineering-a-d-link-backdoor/</a></p>
<p> He fired up binwalk to extract the SquashFS file system, then opened the router webserver on the multi-processor disassembler/debugger IDA. [Craig] discovered that the webserver is actually a modified version of thttpd, providing the administrative interface for the router. As you can see in the picture above, it seems Alphanetworks (a spin-off of D-Link) performed the modifications.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/10/15/d-link-firewall-teardown-and-vulnerability/comment-page-1/#comment-34575</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 15 Oct 2013 07:28:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=22412#comment-34575</guid>
		<description><![CDATA[D-Link to padlock router backdoor by end of October
The backdoor lets attackers change a router configuration without authenticating
http://www.computerworld.com/s/article/print/9243201/D_Link_to_padlock_router_backdoor_by_end_of_October

D-Link will address by the end of October a security issue in some of its routers that could allow attackers to change the device settings without requiring a username and password.

The issue consists of a backdoor-type function built into the firmware of some D-Link routers that can be used to bypass the normal authentication procedure on their Web-based user interfaces.

&quot;If your browser&#039;s user agent string is &#039;xmlset_roodkcableoj28840ybtide&#039; (no quotes), you can access the web interface without any authentication and view/change the device settings,&quot;

When read in reverse, the last part of this hard-coded value is &quot;edit by 04882 joel backdoor.&quot;

D-Link will release firmware updates to address the vulnerability in affected routers by the end of October, the networking equipment manufacturer said via email.

According to Heffner, the affected models likely include D-Link&#039;s DIR-100, DI-524, DI-524UP, DI-604S, DI-604UP, DI-604+, TM-G5240 and possibly DIR-615.]]></description>
		<content:encoded><![CDATA[<p>D-Link to padlock router backdoor by end of October<br />
The backdoor lets attackers change a router configuration without authenticating<br />
<a href="http://www.computerworld.com/s/article/print/9243201/D_Link_to_padlock_router_backdoor_by_end_of_October" rel="nofollow">http://www.computerworld.com/s/article/print/9243201/D_Link_to_padlock_router_backdoor_by_end_of_October</a></p>
<p>D-Link will address by the end of October a security issue in some of its routers that could allow attackers to change the device settings without requiring a username and password.</p>
<p>The issue consists of a backdoor-type function built into the firmware of some D-Link routers that can be used to bypass the normal authentication procedure on their Web-based user interfaces.</p>
<p>&#8220;If your browser&#8217;s user agent string is &#8216;xmlset_roodkcableoj28840ybtide&#8217; (no quotes), you can access the web interface without any authentication and view/change the device settings,&#8221;</p>
<p>When read in reverse, the last part of this hard-coded value is &#8220;edit by 04882 joel backdoor.&#8221;</p>
<p>D-Link will release firmware updates to address the vulnerability in affected routers by the end of October, the networking equipment manufacturer said via email.</p>
<p>According to Heffner, the affected models likely include D-Link&#8217;s DIR-100, DI-524, DI-524UP, DI-604S, DI-604UP, DI-604+, TM-G5240 and possibly DIR-615.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
