Arris Modems Backdoor

Arris modems have three hardcoded backdoors.

NGV589 and NVG599

Below are the backdoors:

#1:  SSH that use the default “remotessh/5SaP9I26” username and password.

#2:  Build in Web Server is vulnerable to a command injection flaw.

#3:  A well-crafted HTTP request sent via port 49152 will allow attackers to bypass the modem’s internal firewall and open a TCP proxy connection to the device.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s