Quoted By:
http://nullfluid.com/asusgate.txt
>ASUSTeK Computer Inc (ASUS) have spent the better part of a year ignoring the fact that their RT-series routers suffer from two CRITICAL security vulnerabilities.
>1. Default setting for the ftp-server was to allow anonymous login. ASUS calls this feature “limitless access rightsâ€. We call this madness.
>2. AiCloud usernames and passwords were stored in plaintext in a file available for download without logging in. We call this insanity.
>This release includes
>- IP-addresses to 12937 ASUS routers with vulnerable FTP and/or AiCloud.
>- 6536 complete and 3605 partial lists of files shared from these ASUS routers.
>- AiCloud login credentials to 3131 ASUS routers.
AiCloud vulnerable ips: http://pastebin.com/nJE7KApf
Open FTP ips:http://pastebin.com/ASfYTWgw
>ASUSTeK Computer Inc (ASUS) have spent the better part of a year ignoring the fact that their RT-series routers suffer from two CRITICAL security vulnerabilities.
>1. Default setting for the ftp-server was to allow anonymous login. ASUS calls this feature “limitless access rightsâ€. We call this madness.
>2. AiCloud usernames and passwords were stored in plaintext in a file available for download without logging in. We call this insanity.
>This release includes
>- IP-addresses to 12937 ASUS routers with vulnerable FTP and/or AiCloud.
>- 6536 complete and 3605 partial lists of files shared from these ASUS routers.
>- AiCloud login credentials to 3131 ASUS routers.
AiCloud vulnerable ips: http://pastebin.com/nJE7KApf
Open FTP ips:http://pastebin.com/ASfYTWgw