• December 07, 2019, 01:29:37 PM
  • Welcome, Guest
Please login or register.

Login with username, password and session length
Advanced search  

News:

This Forum Beta is ONLY for registered owners of D-Link products in the USA for which we have created boards at this time.

Pages: [1] 2

Author Topic: DIR-655 HNAP exploit (and when are you going to fix it?)  (Read 16823 times)

v0idi

  • Level 1 Member
  • *
  • Posts: 12
DIR-655 HNAP exploit (and when are you going to fix it?)
« on: January 11, 2010, 03:44:37 AM »

Hello,

I just stumbled across a blog post (http://www.sourcesec.com/2010/01/09/d-link-routers-one-hack-to-own-them-all/) which details a vulnerability in the HNAP implementation on at least the DIR-655 and a few other D-Link models as well. The vulnerability allows one to change the router settings without knowing the administrator password, and is exploitable at least on the local network.

So, has the problem been acknowledged and when can we expect a fix?
Logged

ozzed3

  • Level 3 Member
  • ***
  • Posts: 143
    • Ozzed.net Bitpop and chip music
Re: DIR-655 HNAP exploit (and when are you going to fix it?)
« Reply #1 on: January 11, 2010, 03:57:52 AM »

They will probably wiff it off by saying that as long as the exploit can not be done from outside the local network there is "nothing to worry about". Then again, not even D-link's staff work "in IT" by the fanboys definition.
Logged


My bitpop and chip music

DCIFRTHS

  • Level 2 Member
  • **
  • Posts: 99
Re: DIR-655 HNAP exploit (and when are you going to fix it?)
« Reply #2 on: January 11, 2010, 04:05:17 AM »


Interesting info. I am interested to see how this unfolds. I really hope the mods have the impartiality leave this thread open, and if necessary, only delete inflammatory posts.
Logged

EndlessDreams

  • Level 1 Member
  • *
  • Posts: 9
Re: DIR-655 HNAP exploit (and when are you going to fix it?)
« Reply #3 on: January 15, 2010, 09:08:31 AM »

Hello,

I just stumbled across a blog post (http://www.sourcesec.com/2010/01/09/d-link-routers-one-hack-to-own-them-all/) which details a vulnerability in the HNAP implementation on at least the DIR-655 and a few other D-Link models as well. The vulnerability allows one to change the router settings without knowing the administrator password, and is exploitable at least on the local network.

So, has the problem been acknowledged and when can we expect a fix?


Kinda funny take a look here as well.

http://www.pcworld.com/businesscenter/article/186996/dlink_issues_fixes_for_router_vulnerabilities.html

Yet I have not saw one single patch yet.. Great going D-Link..
Logged

Lycan

  • Administrator
  • Level 15 Member
  • *
  • Posts: 5335
Re: DIR-655 HNAP exploit (and when are you going to fix it?)
« Reply #4 on: January 15, 2010, 09:27:04 AM »

Get the utility and try it.
I believe we patched that a long time ago. That website is reporting on things from like six months ago.
Logged

EndlessDreams

  • Level 1 Member
  • *
  • Posts: 9
Re: DIR-655 HNAP exploit (and when are you going to fix it?)
« Reply #5 on: January 15, 2010, 09:33:08 AM »

Get the utility and try it.
I believe we patched that a long time ago. That website is reporting on things from like six months ago.

Thats strange if you look at the original posters post it wasnt 6 months ago this was posted there either. They are not the only sites who posted this as well.

Logged

Lycan

  • Administrator
  • Level 15 Member
  • *
  • Posts: 5335
Re: DIR-655 HNAP exploit (and when are you going to fix it?)
« Reply #6 on: January 15, 2010, 09:34:07 AM »

Look at the full write up. It states what firmwares are actually effected.
1.20 for the 655? That OLD.
And it's 1.20EU not even a north american firmware.
Logged

Lycan

  • Administrator
  • Level 15 Member
  • *
  • Posts: 5335
Re: DIR-655 HNAP exploit (and when are you going to fix it?)
« Reply #7 on: January 15, 2010, 09:35:02 AM »

They also refer to a DI-524 and a Di-624M. It's old code and the site is just looking to report on anything.
Logged

EndlessDreams

  • Level 1 Member
  • *
  • Posts: 9
Re: DIR-655 HNAP exploit (and when are you going to fix it?)
« Reply #8 on: January 15, 2010, 09:37:05 AM »

I am going to make a post on there ask them why they are posting news from 6 months ago like you claim... This way its linked back to here and they can get the facts straight...
« Last Edit: January 15, 2010, 09:52:50 AM by EndlessDreams »
Logged

Lycan

  • Administrator
  • Level 15 Member
  • *
  • Posts: 5335
Re: DIR-655 HNAP exploit (and when are you going to fix it?)
« Reply #9 on: January 15, 2010, 09:38:37 AM »

did you read the full write up? It lists the firmwares they tested.
Also i think you mean (here) not hear?
« Last Edit: January 15, 2010, 09:41:07 AM by Lycan »
Logged

EndlessDreams

  • Level 1 Member
  • *
  • Posts: 9
Re: DIR-655 HNAP exploit (and when are you going to fix it?)
« Reply #10 on: January 15, 2010, 09:40:31 AM »

Why would pcworld post stories from 6 months ago if these were not true?
Logged

Lycan

  • Administrator
  • Level 15 Member
  • *
  • Posts: 5335
Re: DIR-655 HNAP exploit (and when are you going to fix it?)
« Reply #11 on: January 15, 2010, 09:42:17 AM »

Your avoiding the question. I can't comment on what they do. What I can comment on is the FULL WRITEUP. Which I read and CLEARLY notes OLD firmware.

Logged

EndlessDreams

  • Level 1 Member
  • *
  • Posts: 9
Re: DIR-655 HNAP exploit (and when are you going to fix it?)
« Reply #12 on: January 15, 2010, 09:43:40 AM »

Have you tested the tool? Cause it clearly works...
Logged

Lycan

  • Administrator
  • Level 15 Member
  • *
  • Posts: 5335
Re: DIR-655 HNAP exploit (and when are you going to fix it?)
« Reply #13 on: January 15, 2010, 09:47:21 AM »

You tested it? We're looking in to it now. Thats why I asked. What were the results of your test?
Logged

EndlessDreams

  • Level 1 Member
  • *
  • Posts: 9
Re: DIR-655 HNAP exploit (and when are you going to fix it?)
« Reply #14 on: January 15, 2010, 09:51:09 AM »

You said this was patched... But yet....

"D-Link Corp. today admitted that some of its routers have a vulnerability that could allow hackers access to a device's administrative settings."

January 15, 2010 11:28 AM ET
Logged
Pages: [1] 2