Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:MISC:MOTOROLA-WR850

Severity

Major

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Motorola WR850G Wireless Router Remote Authentication Bypass

Release Date

2004/10/06

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Motorola WR850G Wireless Router Remote Authentication Bypass


This signature detects attempts to access a debug mode Web shell supplied with the Motorola WR850 Wireless Router. Attackers can use this access exploit in conjunction with an authentication bypass exploit to gain full control over the router.

Extended Description

Motorola WR850G wireless router is reported prone to a remote authentication bypass vulnerability. This issue is caused by a design error and may allow an attacker to ultimately take complete control over the device. A remote attacker can gain access to the Web interface of the affected device by periodically attempting to access restricted pages such as the 'ver.asp' script. Motorola wireless router WR850G running firmware version 4.03 is reportedly affected by this issue. It is possible that other models and firmware versions are affected as well.

Affected Products

  • Motorola wr850g 4.0.0 3 firmware

References

  • BugTraq: 11241
  • CVE: CVE-2004-1550
  • URL: http://broadband.motorola.com/consumers/products/wr850g/
  • URL: http://www.securityfocus.com/archive/1/376384

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out