It should be further noted, that setting a password for the telnet account via the /sbin/chpasswd.sh script is only valid until the next reboot when it gets wiped out. After alerting ASUS, I got the following non-reply. They are not taking the problem seriously (they just closed out the ticket with a generic response): Thank you for contacting ASUS Customer Service. My name is Joe and it is my pleasure to help you with your problem. Thank you for contacting ASUS and providing your feedback. Your information has been documented. If you have further questions or concerns, please contact us at 812-282-2787 and we will be happy to help you. Welcome to refer Troubleshooting & FAQ for ASUS products in ASUS website: http://support.asus.com/servicehome.aspx?SLanguage=en If you continue to experience issues in the future, please do not hesitate to contact us. An email survey will be sent to you within the next 5 days. Please be sure to rate the service I provided to you today. From: [email protected] To: [email protected] Date: Mon, 28 Oct 2013 16:33:52 -0700 Subject: [Full-disclosure] ASUS RT-N13U Unsecured Telnet on LAN and WAN The ASUS RT-N13U home router comes configured with an unsecured telnet for user "admin". Telnetting in with this user will result in a root shell. The telnet is not configurable from the web interface, nor does changing the password on the web interface's admin user make any difference. I have alerted ASUS to the problem on 10/25/13. I have been able to verify that this telnet interface is visible from both the LAN and WAN. Sincerely, Shellster _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
