Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

6
  • Linux based, and I gained access to it's shell (a secret URL). I have access to iptables, but no -tee support. Commented Aug 17, 2015 at 14:10
  • 1
    You can get a root shell on almost every router from the web interface just by abusing the "firmware update" feature to upload a modified firmware image running an sshd and including all the tools you need (tcpdump, etc). Commented Dec 3, 2015 at 1:54
  • This is only correct in the mathematical sense of "almost every", ie. "with a finite number of exceptions". :-) Commented Dec 3, 2015 at 9:59
  • To expand: For many existing routers you will not be able to pull off that feat because the firmware update feature won't work over the WAN interface, or because you don't have a firmware image for it that will be accepted by the firmware update procedure and successfully run on the router with sshd and all those tools. Commented Dec 3, 2015 at 10:11
  • @TilmanSchmidt usually either the web interface isn't available over WAN at all, in which case it's a bit more complicated to exploit (you need to use another service listening on the WAN port or trick the user to visit a page exploiting a CSRF in the router's interface to enable WAN access to the web interface), or the web interface is available with (almost always) all its features enabled, including firmware update. Commented Dec 10, 2015 at 15:23