SYN Flood or FIN Flood attack in ECos 1 and other versions embedded devices results in web Authentication Bypass. "eCos Embedded Web Servers used by Multiple Routers and Home devices, while sending SYN Flood or FIN Flood packets fails to validate and handle the packets and does not ask for any sign of authentication resulting in Authentication Bypass. An attacker can take complete advantage of this bug and take over the device remotely or locally. The bug has been successfully tested and reproduced in some versions of SOHO Routers manufactured by TOTOLINK, GREATEK and others."
References
Link | Resource |
---|---|
http://ecos.sourceware.org/ecos/problemreport.html | Vendor Advisory |
http://ecos.sourceware.org/ecos/problemreport.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://ecos.sourceware.org/ecos/problemreport.html - Vendor Advisory |
Information
Published : 2017-07-17 13:18
Updated : 2024-11-21 03:03
NVD link : CVE-2017-1000020
Mitre link : CVE-2017-1000020
CVE.ORG link : CVE-2017-1000020
JSON object : View
Products Affected
greatek
- soho
totolink
- soho
ecos
- embedded_web_servers
CWE
CWE-287
Improper Authentication