Some D-Hyperlink and Comba WiFi Routers Leak Their Passwords in Plaintext

router password hacking

What might be worse than your router leaking its administrative login credentials in plaintext?

Cybersecurity researchers from Trustwave’s SpiderLabs have found out a couple of safety vulnerabilities in some router fashions from two standard producers—D-Hyperlink and Comba Telecom—that contain insecure garage of credentials, probably affecting each person and machine on that community.

Researcher Simon Kenin instructed The Hacker Information that he found out a complete of five vulnerabilities—two in a D-Hyperlink DSL modem normally put in to glue a house community to an ISP, and three in a couple of Comba Telecom WiFi units.

Those flaws may probably permit attackers to switch your instrument settings, extract delicate data, carry out MitM assaults, redirect you to phishing or malicious websites and release many extra forms of assaults.

“Since your router is the gateway out and in of all of your community it could probably have an effect on each person and machine on that community. An attacker-controlled router can manipulate how your customers get to the bottom of DNS hostnames to direct your customers to malicious internet sites,” Kenin says in a weblog publish printed as of late.

Kenin is similar safety researcher who prior to now found out an identical vulnerability (CVE-2020-5521) in no less than 31 fashions of Netgear routers, permitting faraway hackers to procure the admin password of the affected units and probably affecting over one million Netgear shoppers.

D-Hyperlink WiFi Router Vulnerabilities

The primary vulnerability is living within the dual-band D-Hyperlink DSL-2875AL wi-fi router, the place a document positioned at https://[router ip address]/romfile.cfg incorporates login password of the instrument in plaintext and will also be accessed through somebody with get entry to to the web-based control IP deal with, with out requiring any authentication.

router password hacking

The second one vulnerability affects D-Hyperlink DSL-2875AL and the DSL-2877AL fashions and leaks the username and password the focused router use for authenticating with the Web Provider Supplier (ISP).

In line with the researchers, an area attacker hooked up to the susceptible router or a faraway attacker, in case of the router is uncovered to the Web, can download sufferers’ ISP credentials simply by taking a look on the supply code (HTML) of the router login web page at https://[router ip address]/index.asp.

“The next username & password are utilized by the person to connect with his ISP, leaking this data may permit an attacker to make use of the ones credentials for himself and abuse the ISP,” the advisory for the flaw explains.

“On most sensible of that, dangerous safety behavior of password reuse might be able to permit an attacker to achieve keep an eye on of the router itself.”

Researchers notified D-Hyperlink of the vulnerabilities in early January, however the corporate launched Firmware patches on September 6, simply three days previous to the total disclosure of the problems.

Comba Wi-Fi Get admission to Controller Vulnerabilities

Out of three, the primary vulnerability affects the Comba AC2400 WiFi Get admission to Controller, leaking the MD5 hash of the instrument password simply by having access to the next URL with out requiring any authentication.

https://[router ip address]/09/trade/improve/upcfgAction.php?download=true

“The username is admin, with machine privileges and the md5 of his password is 61d217fd8a8869f6d26887d298ce9a69 (trustwave). MD5 is so easy to damage, if SSH/Telnet is enabled, this would result in a complete takeover of the filesystem of the instrument,” the advisory reads.

router password hacking

The opposite two vulnerabilities affect the Comba AP2600-I WiFi Get admission to Level (model A02,0202N00PD2).

Such a flaws additionally leaks MD5 hash of the instrument username and password in the course of the supply code of the web-based control login web page, whilst the opposite one leaks credentials in plaintext saved in an SQLite database document positioned at https://[router ip address]/goform/downloadConfigFile.

Researchers tried to touch Comba Telecom a couple of occasions since February this 12 months, however by no means succeeded in receiving a reaction.

The entire three vulnerabilities found out in Comba Telecom routers are unpatched on the time of writing, and it stays unknown whether or not the corporate has any plan to handle them or no longer.