Quoting [EMAIL PROTECTED]:
>In-Reply-To: <[EMAIL PROTECTED]>
>>>Possibly vulnerable, not tested, OEM Version from GlobalSunTech:
>>>D-Link DWL-900AP+ B1 version 2.1 and 2.2
>>The D-Link DWL-900AP+ B1 2.1 isn't affected.
> I'm sorry, this device IS vulnerable, I believe AL
* Tom Knienieder
| Possibly vulnerable, not tested, OEM Version from GlobalSunTech:
| D-Link DWL-900AP+ B1 version 2.1 and 2.2
2.2 seems vulnerable, but has different offsets.
sendto(3, "gstsearch", 9, 0, {sin_family=AF_INET,
sin_port=htons(27155),
sin_addr=inet_addr("2
In-Reply-To: <[EMAIL PROTECTED]>
>>Possibly vulnerable, not tested, OEM Version from GlobalSunTech:
>>D-Link DWL-900AP+ B1 version 2.1 and 2.2
>>ALLOY GL-2422AP-S
>>EUSSO GL2422-AP
>>LINKSYS WAP11-V2.2
>
>The D-Link DW
>The Linksys WAP11-V2.2 appears to be at least partially susceptible to
>this trick:
>
>$ ./ksn-wap
>Type: GL2422AP-00-0M0 T1.0 -02
>
>Announced Name : yyy
>Admin Username :
>Admin Password :
The 1.09 firmware does not reply with a password bit the 1.01c firmware
does. (1.01c is n
Hi,
Linksys WAP11-V2.2 seems to be vulnerable in a different way. It only
returns AP's name,
SSID and firmware version. Except for firmware version, those are not
private informations.
Quickly patched proof of concept :
#include
#include
#include
#include
#include
typedef struct {
char
On Sun, 3 Nov 2002, Tom Knienieder wrote:
Tom Knienieder> Possibly vulnerable, not tested, OEM Version from
GlobalSunTech:
Tom Knienieder> D-Link DWL-900AP+ B1 version 2.1 and 2.2
DWL-900AP+ ver 2.2 is vunerable. After changing the test prog (attached)
it returned:
In-Reply-To: <[EMAIL PROTECTED]>
>>Possibly vulnerable, not tested, OEM Version from GlobalSunTech:
>>D-Link DWL-900AP+ B1 version 2.1 and 2.2
>>ALLOY GL-2422AP-S
>>EUSSO GL2422-AP
>>LINKSYS WAP11-V2.2
>
>The D-Link DWL-
In-Reply-To: <[EMAIL PROTECTED]>
>Possibly vulnerable, not tested, OEM Version from GlobalSunTech:
>D-Link DWL-900AP+ B1 version 2.1 and 2.2
>ALLOY GL-2422AP-S
>EUSSO GL2422-AP
>LINKSYS WAP11-V2.2
The D-Link DWL-900AP+
In-Reply-To: <[EMAIL PROTECTED]>
>
>The D-Link DI-614+ (which is based on the GL2422RT) is not vulnerable to
this problem
>
This is not true. Also the DI-614+ (Firmware v2.03) is affected! We were
able to download all these files using TFTP the same way it is possible on
the 900AP+
The Linksys WAP11-V2.2 appears to be at least partially susceptible to
this trick:
$ ./ksn-wap
Type: GL2422AP-00-0M0 T1.0 -02
Announced Name : yyy
Admin Username :
Admin Password :
PaulM
-Original Message-
From: Tom Knienieder [mailto:knienieder@;khamsin.ch]
Sent: Sunday
On Sun, Nov 03, 2002 at 02:43:25PM +0100, Tom Knienieder wrote:
> Systems Affected
>
> Vulnerable, tested, OEM Version from GlobalSunTech:
> WISECOM GL2422AP-0T
>
> Possibly vulnerable, not tested, OEM Version from GlobalSunTech:
>
On Sun, Nov 03, 2002 at 02:43:25PM +0100, Tom Knienieder wrote:
>
> KHAMSIN Security News
> KSN Reference: 2002-11-01 0001 ULO
> ---
>
> Title
> -
> Accesspoints disclose wep keys, password and mac filter
>
> Dat
12 matches
Mail list logo