AX10 Busybox vulnerabilities?

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.

AX10 Busybox vulnerabilities?

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.
AX10 Busybox vulnerabilities?
AX10 Busybox vulnerabilities?
2021-07-31 11:45:23 - last edited 2021-07-31 19:49:11
Model: Archer AX10  
Hardware Version: V2
Firmware Version: 1.1.6 Build 20210108 Rel. 60533(4555)

Hey folks.

Scanning the AX10 internal IP reveals, that the webserver used, is the one by Busybox HTTP 1.19.4 -
443/tcp  open  ssl/http syn-ack ttl 64 BusyBox http 1.19.4

If its true, and it uses indeed Busybox 1.19.4, thats REALLY OLD, like 10 year old version.

Which makes it vulnerable to the following exploits:

https://vulmon.com/vulnerabilitydetails?qid=CVE-2013-1813&scoretype=cvssv2

https://nvd.nist.gov/vuln/detail/CVE-2011-2716

And another thing:

The webserver allows SSL3 and TLSv1.0 connections with HTTPS enabled.

Those are also pretty old.

Even then, the TLS v1.1 and TLS v1.2 used SSL ciphers also include deprecated ones, since 6 years already (February 2015).

|     warnings:

|       Broken cipher RC4 is deprecated by RFC 7465

|       CBC-mode cipher in SSLv3 (CVE-2014-3566)

Perhaps, is it time for an firmware update, which updates Busybox to a new version, and disables the SSL3 and TLS v1.0?

And maybe add TLS v1.3 support. The chipset supports OpenSSL 1.1.1g.
Security is important, its 2021 after all. Even more, when the router is from 2020.

  0      
  0      
#1
Options
1 Reply
Re:AX10 Busybox vulnerabilities?
2021-08-03 08:21:09

@Kevin_Z Hey, sorry for the ping.

Do you perhaps have some information, or if not, can you forward this to the developers?

  0  
  0  
#2
Options