TCP-32764
TCP-32764 copied to clipboard
some codes and notes about the backdoor listening on TCP-32764 in linksys WAG200G.
Backdoor is working and listening on the internet on LevelOne WBR-6002 N . ``` $ ./poc.py --ip=192.168.0.1 --shell welcome, here is a root shell, have fun iptables -L Chain INPUT...
Hi all, my Netgear DG834G was affected by the backdoor. I fixed it, from the WAN side, by simply blocking the port 32764 using a new firewall rule for the...
I've been researching this backdoor, after seeing the excellent work done by Eloi. I found these models are working on the external wan interfaces, and have been able to get...
Firmware Version 1.3.1 I successfully got in before, but then it magically closed. After a reboot: justaguy@marie:~/TCP-32764$ ./poc.py --shell --ip 192.168.254.130 Traceback (most recent call last): File "./poc.py", line 66,...
Router: FRT-401NS15 Firmware: v1.8 probably not vulnerable (error: [Errno 111] Connection refused)
``` $python3 poc.py --get_credentials --ip $(ip route|grep -Eo 'default via ([0-9.]+)'|sed 's/default via //') Traceback (most recent call last): File "/home/david/Bureau/poc.py", line 58, in s.connect((args.ip, args.port)) TimeoutError: timed out During...