Researcher discovers new backdoor in D-Link Firmware
Shortly after a backdoor in some D-Link routers poem, a security researcher has discovered a new backdoor in an older model. It is a telnet server with a default password.
D-Link logo logo (27 pix) Security Researcher Matteo Ignaccolo came the backdoor own words back in 2009 against, but has not reported it at the time. Anno 2013, the backdoor is still located in the firmware of multiple D-Link routers to find, so writes the researcher on his own website. In any case, the D-Link DAP-1522 is affected; router which dates from 2009 but is still being sold. What models are even more vulnerable, is unclear.
Ignaccolo discovered the telnet server with a simple port scan. The password of the Telnet server is a derivative of the manufacturer name, model name and used the wifi chip: wapnd01_dlink_dap1522. Moreover, the password is stored in plain text in the source code of the chip. Given the simplicity of the password, it is plausible that it is a default password, which is the same for all models, but that is not the message of Ignaccolo.
The existence of the back is done according to the security researcher anywhere in the documentation explained. It is unclear whether the telnet server is only locally accessible, or even from the rest of the Internet. Previously discovered a researcher backdoors in all other D-Link routers, which have recently been resolved. D-Link was not available for a substantive response.
Tags: Researcher discovers new backdoor in D-Link Firmware