IEEE International Symposium on Signal Processing and Information Technology 2013
DOI: 10.1109/isspit.2013.6781868
|View full text |Cite
|
Sign up to set email alerts
|

The weakest link on the network: Exploiting ADSL routers to perform cyber-attacks

Abstract: ADSL routers are an integral part of today's home and small office networks. Typically, these devices are provided by a user's ISP and are, usually, managed by people who do not have any special technical knowledge. Often poorly configured and vulnerable, such devices are an easy target for network-based attacks, allowing cyber-criminals to quickly and easily gain control over a network. In this paper, we systematically evaluate the security of ADSL routers and identifY the potential of attacks, which attempt … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…More specically, in a previous paper [58], we investigated the security of a popular ADSL router named ZTE ZXV10 H108L ADSL 2+ Wireless Router, provided by the Telecommunication Company "WIND Hellas". Through the usage of Commix tool, we were able to automatically identify exploitable classic results-based, time-based blind and le-based semi blind command injection vulnerabilities on the "host" POST parameter of the "manager_dev_ping_t.gch", that allow an attacker to execute arbitrary commands on the target host system, with highly granular permissions/privileges.…”
Section: Wsn-ip-interoperabilitymentioning
confidence: 99%
“…More specically, in a previous paper [58], we investigated the security of a popular ADSL router named ZTE ZXV10 H108L ADSL 2+ Wireless Router, provided by the Telecommunication Company "WIND Hellas". Through the usage of Commix tool, we were able to automatically identify exploitable classic results-based, time-based blind and le-based semi blind command injection vulnerabilities on the "host" POST parameter of the "manager_dev_ping_t.gch", that allow an attacker to execute arbitrary commands on the target host system, with highly granular permissions/privileges.…”
Section: Wsn-ip-interoperabilitymentioning
confidence: 99%