TITLE: Dell TrueMobile Wireless Router Authentication Bypass Vulnerability SECUNIA ADVISORY ID: SA17936 VERIFY ADVISORY: http://secunia.com/advisories/17936/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From local network SOFTWARE: Dell TrueMobile 2300 Wireless Broadband Router http://secunia.com/product/6399/ DESCRIPTION: TNull has reported a vulnerability in Dell TrueMobile Wireless Broadband Router, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to an access control error in the "apply.cgi" page of the router's web management interface. This can be exploited to reset the authentication credentials by accessing the affected page directly. Example: http://[router]/apply.cgi?Page=adv_password.asp&action=ClearLog The vulnerability has been reported in Dell TrueMobile 2300 firmware versions 3.0.0.8 and 5.1.1.6. SOLUTION: The product has reportedly been discontinued and a patch will not be issued. PROVIDED AND/OR DISCOVERED BY: TNull ORIGINAL ADVISORY: iDEFENSE: http://www.idefense.com/application/poi/display?id=348&type=vulnerabilities ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------