<http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/>

"In other words, if your browser’s user agent string is
“xmlset_roodkcableoj28840ybtide” (no quotes), you can access the web
interface without any authentication and view/change the device settings".

It seems it was put in through stupidity, rather than malice.  Though,
it could be used for malicious purposes too, as seen in this
proof-of-concept code:

<http://pastebin.com/vbiG42VD>

~ Pranesh

-- 
Pranesh Prakash
Policy Director
Centre for Internet and Society
T: +91 80 40926283 | W: http://cis-india.org
PGP ID: 0x1D5C5F07 | Twitter: @pranesh_prakash
--------------------
Postgraduate Associate & Access to Knowledge Fellow
Information Society Project, Yale Law School
T: +1 520 314 7147 | W: http://yaleisp.org

-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Reply via email to