Korean
<< Back
VID 29105
Severity 40
Port 2601
Protocol TCP
Class TELNET
Detailed Description The relevant host seems to be the Netgear DG834G device and contains a default password. Netgear DG834G is a wireless firewall, router, and switch for DSL connections. Netgear DG834G devices contain a default password, 'zebra' for their Zebra process. Zebra is a dynamic routing daemon, and contains a telnet-accessible configuration shell. Zebra listens on both the WAN and the internal network interfaces. By gaining administrative access to Zebra, an attacker has the ability to modify network routes on the device, possibly redirecting traffic or denying network service to legitimate users.

* References:
http://www.securityfocus.com/archive/1/371575
http://packetstormsecurity.org/filedesc/netgearDG834G.txt.html

* Platforms Affected:
Netgear DG834G Any version
Recommendation Edit zebra.conf and set up the default password to a value that is difficult to guess.
Related URL (CVE)
Related URL 10935 (SecurityFocus)
Related URL 16981 (ISS)