Two vulnerabilities affecting over one million routers, and disclosed earlier this week, are now under attack by botnet herders, who are trying to gather the vulnerable devices under their control.
Attacks started yesterday, Thursday, May 3, according to Netlab, the network security division of Chinese cyber-security vendor Qihoo 360.
Exploitation of these two flaws started after on Monday, April 30, an anonymous researcher published details of the two vulnerabilities via the VPNMentor blog.
Simple hacks expose Dasan GPON routers
His findings detail two flaws —an authentication bypass (CVE-2018-10561) and a remote code execution vulnerability (CVE-2018-10562).
The most ludicrous of these two flaws is the first, which basically allows anyone to access the router’s internal settings by appending the « ?images » string to any URL, effectively giving anyone control over the router’s configuration.
By combining these two issues, the anonymous researcher said he was able to bypass authentication and execute code on vulnerable devices. A video by the VPNMentor crew summarizes the findings.
Over one million routers available online
These vulnerabilities affect GPON-capable routers manufactured by South Korean vendor Dasan. GPON stands for Gigabit Passive Optical Network and is a type of telecommunications technology for supporting home internet connections via optic fiber lines. As such, these devices are mostly provided to internet service providers (ISPs), who then distribute them to their customers.
The researcher said he was able to identify over one million of the vulnerable devices deployed online, most of which are located in large chunks in Mexic, Kazakhstan, and Vietnam, countries where ISPs appear to have rolled out their infrastructure on top of Dasan GPON devices.
360 Netlab researchers said they’ve identified one botnet operating from a command-and-control server located in Vietnam that is currently scanning and attempting to exploit these devices. The company promised more detailed information about these attacks in the coming days, on its blog.
To read the original article: