Thursday, April 9, 15:59
Home security Comba and D-Link WiFi routers leak user credentials!

Comba and D-Link WiFi routers leak user credentials!

The team ethical hacking by Trustwave, SpiderLabs, discovered some leaks of credentials on D-Link and Comba Telecom routers. Specifically, researcher Simon Kenin from the team found 5 such leaks, three of which concern some Comba Telecom Wi-Fi routers and the rest of the D-Link DSL modem.


With these leaks, one hacker could use credentials to exploit routers and change its settings device to perform malicious actions.

In a previous investigation, Kenin discovered similar ones vulnerabilities (CVE-2017-5521) in its dozens of routers models Netgear, which affected more than a million users of the company.

When analyzing the D-Link DSL-2875AL wireless router, experts discovered that a file located at https: // [router ip address] /romfile.cfg contains the password of the device in plaintext. Thus, anyone with access to the IP address could read the files without authentication. Kenin thus assured that at least the 1.00.01 and 1.00.05 versions of the routers are definitely affected.

As the security expert said, the username and password are used by the user to connect to his ISP. This could allow a hacker to access the account ISP or the router itself if it used the same credentials.

- Advertisement -


Of course, the company was immediately notified of the vulnerability in early July, but the D-Link patch was released on 6 in September.

One of the three vulnerabilities affecting Comba routers also affects Comba AC2400. The other two vulnerabilities affect the Comba AP2600-I WiFi Access Point.

These kinds of routers vulnerabilities are very serious. Routers are essentially the path to and from network and only one such defect can potentially affect each user and system on this network. A hacker-controlled router can block access to and from the network.

In a world without fences and walls, who needs Gates and Windows


Please enter your comment!
Please enter your name here


Tails 4.5: The new, safer version has been released!

Tails 4.5: The new, safer version has been released - Tails, is a live operating system based on ...

Windows 10 feature helps to delete useless files and apps

Windows 10 will make it easier to delete useless files and apps by displaying them in a list.

Cloudflare: Stops using Google's reCAPTCHA!

Cloudflare has announced that it will stop using Google's reCAPTCHA and switch to a new bot detector that ...

Google Stadia Pro is available for free for two months! Time for video games!

The situation we are experiencing lately due to corona, is one of the most difficult situations of ...

Russia is expected to try to manipulate the 2020 elections

The report comes after election security experts remain on alert for attempts to manipulate the 2020 election by ...

COVID-19: Can it be "reactivated" in treated patients?

According to the Korean Centers for Disease Control and Prevention (KCDC), Coronavirus COVID-19 can be "reactivated" in treated patients. Indicatively, approximately ...

Instructions for the face shields created by Apple

The pandemic of coronavirus has affected all areas of our daily lives and especially our work ....

Windows 10: WSL Linux integration test in File Explorer

Windows 10 improves integration between Windows Subsystem for Linux (WSL) and File Explorer, ...

XHelper malware: reinstalled after resetting to factory settings

The malware XHelper, which affects devices running the Android operating system, was first discovered ...

The Fall of the Zoom: Google forbids its employees to use it

A few weeks ago, Zoom was one of the top teleconferencing solutions. Many people working ...