A host of home Wi-Fi routers based on Realtek silicon may be vulnerable to a remote code execution attack thanks to a hole in Realtek's software development kit (SDK).
To support the universal plug-and-play (UPnP) standard, Realtek built a service/daemon into its SDK that listens for UPnP calls. Unfortunately, the developers didn't implement a proper input sanitization for NewInternalClient call. As a result, the bad guys may be able to cause a Realtek-based device execute malicious code.
Here are a few resources to help identify if you have a SOHO router based on the Realtek 81xx-series SoC that may be vulnerable to attack.
realtek port:1900 net:[ip address]
Server: OS 1.0 UPnP/1.0 Realtek/V1.3
If you find that your router is vulnerable, you can protect yourself by disabling UPnP in the management interface. You'll also want to check to see if your vendor has announced a pending update to correct this flaw. Notably, D-Link is already at work on updates.
|1. BIF - $340||2. Ryu Connor - $250||3. mbutrovich - $250|
|4. YetAnotherGeek2 - $200||5. End User - $150||6. Captain Ned - $100|
|7. Anonymous Gerbil - $100||8. Bill Door - $100||9. ericfulmer - $100|
|10. dkanter - $100|
|SolidRun MicroSoM offers Braswell CPUs on a tiny package||14|
|Friday Night Shortbread||20|
|Doom's latest update adds Deathmatch and private matches||10|
|Rumor: Google to showcase mesh networking router soon||8|
|Deals of the week: SSD storage and a gaming laptop||15|
|Asus upgrades its G11 gaming desktops with Pascal power||11|
|Work with Pritchard again in Mankind Divided's System Rift DLC||6|
|Titanfall 2 PC requirements point to a smooth experience||33|
|DSFix creator Durante outlines the realities of game optimization||30|