关键信息 漏洞标题: Netis WF-2404 Router Firmware Version: APR-R4A4-V1.1.124EN-Netis(WF-2404),2010.12.14 16:18. Use of Weak Hash 描述: - RealTek RTL8196C chip exposes UART serial debug console on router PCB. - It drops you into a root shell without prompting for any authentication. - Physical access is required but soldering not required, can be performed trivially without lasting detection. - The default password for the RealTek root password (which happens to be "realtek") is stored using DESCrypt for hashing. - Cracked in 12 seconds on a personal laptop. 参考链接: - https://seozzi.substack.com/p/hacking-a-netis-wf-2404-router-cont - https://passlib.readthedocs.io/en/stable/lib/passlib.hash.des_crypt.html 提交信息: - 来源: https://seozzi.substack.com/p/hacking-a-netis-wf-2404-router-cont - 用户: seozzi (UID 83936) - 提交时间: 10/28/2021 11:52 PM (14 days ago) - 审核时间: 10/28/2021 12:18 PM (13 days later) - 状态: Approved - VulDB条目: [Netis WF-2404 1.1.124EN /etc/passwd default password] - 积分: 20