Hacker News new | past | comments | ask | show | jobs | submit login
Source code for backdoor found in Tenda router
15 points by jenandre on Oct 19, 2013 | hide | past | favorite | 4 comments




https://github.com/socoola/yhrouter/blob/master/user/goahead...

I'm no security export, but what this is doing is creating a UDP socket (SOCK_DGRAM) that expects commands to be executed (using call_shell()). It then replies with the output back to the sender of the UDP packet.


Er... where, exactly?


Looks like here is where it gets interesting: https://github.com/socoola/yhrouter/blob/master/user/goahead...

An example fo the inbound command structure, then code further below to execute it and respond.

It listens on the LAN interface (assuming the value shown is what it says it is) for datagram requests. Unless I'm missing something, that seems to indicate an attacker must already be on the same network.

It does shell out the commands it receives - so perhaps more interesting would be look and see what kinds of accessible binaries and scripts ship on the device.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: