Skip to main content

Security Considerations of Modern Embedded Devices and Networking Equipment

  • Conference paper
  • First Online:
Computer Networks (CN 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 860))

Included in the following conference series:

  • 879 Accesses

Abstract

The aim of this paper is to present the potential impact and risks related with security breaches in modern networking equipment and embedded devices in general. Firstly, the possible attack vectors and exemplary exploitation methods are presented. The methods are based on real vulnerabilities the author has recently found in a popular wireless router software. Besides presenting the vulnerabilities themselves the papers main goal is to assess the possible impact of a successful attack. Author presents several post exploitation methods which show how easily it is to use the fully-featured embedded device operating system maliciously.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Functions in C without bounds checking: sprintf, vsprintf, snprintf, vsnprintf, memcpy, mempcpy, memmove, memset, strcpy, stpcpy, strncpy, strcat, strncat.

  2. 2.

    For example, session handling in a HTTP server.

  3. 3.

    Attacker can remotely detect which services are supported by the device using tools like nmap.

  4. 4.

    The Shodan’s query used to find all vulnerable devices was: ““RT-” httpd Unauthorized” [14].

  5. 5.

    Unfortunately these devices are usually home and small office routers and can frequently be offline. Shodan verifies them continuously - thus, it is very probable that a part of the offline devices can appear online in the near future.

References

  1. Adamczyk, B.: CVE-2017-15654. http://sploit.tech/2018/01/16/ASUS-part-II.html. Accessed 17 Jan 2018

  2. Adamczyk, B.: CVE-2017-15655. http://sploit.tech/2018/01/16/ASUS-part-I.html. Accessed 17 Jan 2018

  3. Adamczyk, B.: CVE-2017-15656. http://sploit.tech/2018/01/16/ASUS-part-II.html. Accessed 17 Jan 2018

  4. Artenstein, N.: Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom’s Wi-Fi Chipsets. In: Blackhat (2017)

    Google Scholar 

  5. ASUSTeK Computer Inc.: ASUSWRT. https://www.asus.com/ASUSWRT/. Accessed 17 Jan 2018

  6. Bierbaumer, B.: CVE-2017-6548. https://bierbaumer.net/security/asuswrt/#remote-code-execution. Accessed 17 Jan 2018

  7. Cutlip, Z.: DLink DIR-815 UPnP Command Injection. http://shadow-file.blogspot.com/2013/02/dlink-dir-815-upnp-command-injection.html. Accessed 17 Jan 2018

  8. Fox-IT: CVE-2015-7755. https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7755. Accessed 17 Jan 2018

  9. Google Inc.: CVE-2016-10229. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10229. Accessed 17 Jan 2018

  10. Marlinspike, M.: SSLStrip. https://moxie.org/software/sslstrip/. Accessed 17 Jan 2018

  11. Postelstorfer, F.: CVE-2014-9583. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9583. Accessed 17 Jan 2018

  12. Reverse Shell Security: routersploit: The Router Exploitation Framework. https://github.com/reverse-shell/routersploit. Accessed 17 Jan 2018

  13. Shodan: Shodan Search Engine. https://www.shodan.io/. Accessed 17 Jan 2018

  14. Shodan: Vulnerable ASUS Routers - Shodan Report. https://www.shodan.io/report/u7ejeYKQ. Accessed 26 Feb 2018

  15. Vanderbeken, E.: TCP-32764. https://github.com/elvanderb/TCP-32764. Accessed 17 Jan 2018

Download references

Acknowledgements

The research was supported by Silesian University of Technology grant No. BKM-509/RAU2/2017.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Błażej Adamczyk .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Adamczyk, B. (2018). Security Considerations of Modern Embedded Devices and Networking Equipment. In: Gaj, P., Sawicki, M., Suchacka, G., Kwiecień, A. (eds) Computer Networks. CN 2018. Communications in Computer and Information Science, vol 860. Springer, Cham. https://doi.org/10.1007/978-3-319-92459-5_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-92459-5_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-92458-8

  • Online ISBN: 978-3-319-92459-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics