Korean
<< Back
VID 29091
Severity 40
Port 80
Protocol TCP
Class WWW
Detailed Description The target host, according to its web interface, appears to be a US Robotics Broadband router.
US Robotics Broadband Router 8003 is a small home/SOHO router which is configured using a HTML interface. This interface, as usual, asks for a password in order to let you view or change configuration parameters. But there is a flaw in the interface which make it disclose the administrative password in the file /menu.htm.
US Robotics Broadband Router 8003 routers running firmware version 1.04 08 transmit a user's password in plain text, when a user logs onto the device's Web interface. When the password is being transmitted, an attacker can read it using a sniffing tool. This flaw would allow a remote attacker to obtain this information and gain unauthorized access to the device to view or modify configuration information.

* References:
http://www.securityfocus.com/archive/1/365445
http://archives.neohapsis.com/archives/bugtraq/2004-06/0109.html

* Platforms Affected:
U.S. Robotics Broadband Router 8003 1.04 08
Recommendation No upgrade or patch available as of June 2014.

As a temporary workaround, disable the webserver or restrict access to the administration web interface to only trusted hosts.
Related URL (CVE)
Related URL 10490 (SecurityFocus)
Related URL 16356 (ISS)