Hacker Newsnew | past | comments | ask | show | jobs | submit | jasonladuke0311's commentslogin

I don’t think there’s much overlap between “people who run OpenWRT” and “people who use EOL D-Link routers”


Wouldn't the overlap between “people who run OpenWRT” and “people who use EOL D-Link routers” be "people who run OpenWRT on EOL D-Link routers"? The table of supported hardware at the OpenWRT site lists several D-Link models which can run the latest OpenWRT release, and several of them are marked as "discontinued" (that is, no longer sold), a few of them even being in that status for more than five years.


I don't know, I've installed openwrt on each device I've owned especially because their original firmware wasn't supported anymore (or crap to begin with).

Often because the cheap devices were either all I could afford or because I've even gotten them for free or basically free, like on flea markets.


That’s insane.


It's also wrong. If the C code presented is accurate the URL would have to contain &name=%22;shell-command-to-run;%22, or perhaps &name=$(shell-command-to-run). name=%27;shell-command-to-run%27 is mostly harmless.

That's nit-picky I know, but when some dude on the internet is trying to get clicks via manufactured rage at incompetent programmers, it's kinda ironic his code is buggy too.


Don't shoot the messenger. This is from the people who discovered it:

https://netsecfish.notion.site/Command-Injection-Vulnerabili...

> The vulnerability is localized to the account_mgr.cgi script, particularly in the handling of the cgi_user_add command. The name parameter in this script does not adequately sanitize input, allowing for command execution.

> /cgi-bin/account_mgr.cgi?cmd=cgi_user_add&name=%27;<INJECTED_SHELL_COMMAND>;%27

I know, I know, that would mean the exact command run, based on the reversed code shown on screen at https://youtu.be/-vpGswuYVg8?t=656 would be

    adduser -u "';<INJECTED_SHELL_COMMAND>;'" -p "" >/dev/null
which would be harmless, so clearly if the PoC says %27 then the real format string must be more like "adduser -u '%s' ...". Maybe the Youtuber reversed the wrong firmware. But nonetheless, the point is gotten across.


At ring 0 I assume. Not that it would matter, I imagine privesc would be fairly trivial.


Yep it’s very much a prisoner’s dilemma. If I choose a smaller car then my family is in greater danger.


That reminds me of the old “bump key” vuln in physical locks with tumblers


Haha similar story. I used to deliver pizzas and worked with a pretty rough crowd. Once I locked my car while it was running and had a bunch of deliveries. One of the cooks unlocked it in about five seconds.


I have a similar story! Locked out of my car. Bikers park next to me.

"You locked out? Hang on a moment"

Goes into a Subway, comes back with a coat hanger.

Less than a minute later the car is unlocked.

"Wow you're pretty good at that"

"I literally just got out of prison today... for car theft."

Laughter all around


Who knew there were so many Good Samaritan car thieves out there, huh? I guess everyone enjoys a chance to show off their skill set a little!


There are a lot of companies that probably don’t have “official” partnerships with the govt but absolutely help them, like every social media company, OS maker, telecom, auto maker, and ISP.


Who is “they?” Are you suggesting that all laborers are homophobic?


> Auto-fire is trivial to detect

How is this done? Input rate variability or something?


Selecting for intelligence/education/creativity is objectifying? Boy that’s a new one.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: