<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: My firewall was a security risk</title>
	<atom:link href="http://www.epanorama.net/blog/2014/02/11/my-firewall-was-a-security-risk/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2014/02/11/my-firewall-was-a-security-risk/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 05 Apr 2026 18:35:45 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/02/11/my-firewall-was-a-security-risk/comment-page-1/#comment-1473293</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 15 Feb 2016 17:29:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=24817#comment-1473293</guid>
		<description><![CDATA[D-link DIR-100 UART 
http://hwmayer.blogspot.fi/2010/09/d-link-dir-100-uart.html

First thing that I&#039;ve wanted to do was to add a serial port connector to see what&#039;s running inside it. After opening the case it was easy to find the UART pins on the PCB, as they looked similar as in other D-Link devices.

Reverse Engineering a D-Link Backdoor
http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/]]></description>
		<content:encoded><![CDATA[<p>D-link DIR-100 UART<br />
<a href="http://hwmayer.blogspot.fi/2010/09/d-link-dir-100-uart.html" rel="nofollow">http://hwmayer.blogspot.fi/2010/09/d-link-dir-100-uart.html</a></p>
<p>First thing that I&#8217;ve wanted to do was to add a serial port connector to see what&#8217;s running inside it. After opening the case it was easy to find the UART pins on the PCB, as they looked similar as in other D-Link devices.</p>
<p>Reverse Engineering a D-Link Backdoor<br />
<a href="http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/" rel="nofollow">http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/02/11/my-firewall-was-a-security-risk/comment-page-1/#comment-1473292</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 15 Feb 2016 17:28:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=24817#comment-1473292</guid>
		<description><![CDATA[D-Link DIR-100 rev A
https://wikidevi.com/wiki/D-Link_DIR-100_rev_A

xmlset roodkcableoj28840ybtide
https://wikidevi.com/wiki/Xmlset_roodkcableoj28840ybtide]]></description>
		<content:encoded><![CDATA[<p>D-Link DIR-100 rev A<br />
<a href="https://wikidevi.com/wiki/D-Link_DIR-100_rev_A" rel="nofollow">https://wikidevi.com/wiki/D-Link_DIR-100_rev_A</a></p>
<p>xmlset roodkcableoj28840ybtide<br />
<a href="https://wikidevi.com/wiki/Xmlset_roodkcableoj28840ybtide" rel="nofollow">https://wikidevi.com/wiki/Xmlset_roodkcableoj28840ybtide</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/02/11/my-firewall-was-a-security-risk/comment-page-1/#comment-110435</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 12 Feb 2014 11:26:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=24817#comment-110435</guid>
		<description><![CDATA[My old DIR-100 firewall also seemed to have also same backdoor vulnerability as this one
http://www.epanorama.net/newepa/2013/10/15/d-link-firewall-teardown-and-vulnerability/

I had fixed that in time by disabled by disabling management though WAN port (which is always a good idea unless you absolutely need it).]]></description>
		<content:encoded><![CDATA[<p>My old DIR-100 firewall also seemed to have also same backdoor vulnerability as this one<br />
<a href="http://www.epanorama.net/newepa/2013/10/15/d-link-firewall-teardown-and-vulnerability/" rel="nofollow">http://www.epanorama.net/newepa/2013/10/15/d-link-firewall-teardown-and-vulnerability/</a></p>
<p>I had fixed that in time by disabled by disabling management though WAN port (which is always a good idea unless you absolutely need it).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/02/11/my-firewall-was-a-security-risk/comment-page-1/#comment-107706</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 11 Feb 2014 16:49:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=24817#comment-107706</guid>
		<description><![CDATA[It seems that there has been several different versions of DIR-100 on market, each needing
different firmware software. I seem to have oldest revision RevB and newest firmware for it.
http://ftp.dlink.ru/pub/Router/DIR-100/Firmware/]]></description>
		<content:encoded><![CDATA[<p>It seems that there has been several different versions of DIR-100 on market, each needing<br />
different firmware software. I seem to have oldest revision RevB and newest firmware for it.<br />
<a href="http://ftp.dlink.ru/pub/Router/DIR-100/Firmware/" rel="nofollow">http://ftp.dlink.ru/pub/Router/DIR-100/Firmware/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/02/11/my-firewall-was-a-security-risk/comment-page-1/#comment-107329</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 11 Feb 2014 14:05:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=24817#comment-107329</guid>
		<description><![CDATA[I also found out this: 

Easy to exploit backdoor found in several D-Link router models
http://hexus.net/tech/news/network/61245-easy-exploit-backdoor-found-several-d-link-router-models/

It has been found that seven domestic router models, made by well-known networking firm D-Link, can be easily controlled remotely via a back door.

provides full access to the router web interface with no username or password required]]></description>
		<content:encoded><![CDATA[<p>I also found out this: </p>
<p>Easy to exploit backdoor found in several D-Link router models<br />
<a href="http://hexus.net/tech/news/network/61245-easy-exploit-backdoor-found-several-d-link-router-models/" rel="nofollow">http://hexus.net/tech/news/network/61245-easy-exploit-backdoor-found-several-d-link-router-models/</a></p>
<p>It has been found that seven domestic router models, made by well-known networking firm D-Link, can be easily controlled remotely via a back door.</p>
<p>provides full access to the router web interface with no username or password required</p>
]]></content:encoded>
	</item>
</channel>
</rss>
