NetGear routers rooted by SQLi

Powered by SC Magazine
 

Don't overlook the simple stuff.

A BlackHat presenter has extracted passwords from temporary databases in consumer routers including Netgear using SQL Injection attacks.

Tactical Network Solutions researcher Zachary Cutlip gained remote root access to Netgear wireless routers using SQL injection (SQLi) to exploit unexposed buffer overflows.

The same SQLi was used to extract plain text passwords from the routers' file systems.

The research, reported on DarkReading and to be presented at BlackHat Las Vegas this month, would show how low-level exploits could be strung together to gain root access to consumer routers.

Cutlip told DarkReading he hoped the attacks demonstrated that researchers shouldn't overlook SQL injection vulnerabilities that may seem benign.

"In this case, we're going to be exploiting a SQL injection in a database that has very temporary data but it has no valuable data whatsoever.

"So it might seem there would be no motivation to attack the database. But by doing so, it's going to give us access to some other vulnerabilities."

Copyright © SC Magazine, Australia


NetGear routers rooted by SQLi
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 709

Vote