[Full-disclosure] 2Wire Broadband Router Session Hijacking Vulnerability
- From: YGN Ethical Hacker Group <lists@xxxxxxxx>
- Date: Mon, 9 Aug 2010 23:12:29 +0800
2Wire Broadband Router Session Hijacking Vulnerability
The 2Wire Broadband Router is vulnerable to Session Hijacking flaw
which attackers can compromise the router administrator session.
2. PRODUCT DESCRIPTION
2Wire routers, product of 2Wire, are widely-used Broadband routers in
They are distributed through most famous ISPs (see -
http://2wire.com/?p=383) with ready-to-use pre-configured settings.
Their Wireless SSIDs are well-known as "2WIRE" prefix.
3. VULNERABILITY DESCRIPTION
The web-based management interface of 2Wire Broadband router does not
generate truely unique random session IDs for a logged-in
This allows attackers to brute-force guess a valid session ID to
compromise the administrator session.
For more information about this kind of weekness,
refer to CWE-330: Use of Insufficiently Random Values and CWE-331:
4. VERSIONS AFFECTED
Model: 2700HGV-2 Gateway
Hardware Version: 2700-100657-005
Software Version: 220.127.116.11
Other versions might be affected as well.
Attackers can compromise 2wire administrator session through automated
tools and modify any settings they want.
There is no upgrade/patch currently available. 2wire support could not
estimate when the upgrade is available.
Also, 2wire users must be aware of other unfixed vulnerabilities
stated in references section.
About 2Wire - http://www.2wire.com/index.php?p=486
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
10. DISCLOSURE TIME-LINE
07-25-2010: vulnerability discovered
07-29-2010: notified vendor
08-02-2010: vendor responded/verified
08-09-2010: vendor did not respond when fix/upgrade would be available
08-09-2010: vulnerability disclosed
Original Advisory URL:
Other unfixed 2Wire Vulnerabilities: http://www.hakim.ws/
Related WebGoat Lesson:
YGN Ethical Hacker Group
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- Prev by Date: [Full-disclosure] Project Vigilant
- Next by Date: Re: [Full-disclosure] Project Vigilant
- Previous by thread: [Full-disclosure] 2Wire Broadband Router Session Hijacking Vulnerability
- Next by thread: Re: [Full-disclosure] 2Wire Broadband Router Session Hijacking Vulnerability