A number of vulnerabilities exist in the Netgear ISDN RH348 and RT328 routers, made by Nortel networks. These vulnerabilities can result in the denial of traffic flowing through the router, as well as prevent effective management of the router. Denial of Service 1: It has been reported that SYN scanning the router, using a tool like NMAP, will render telnet connectivity to these routers nonexistent. Denial of Service 2: Establishing a telnet connection to the router will prevent any other connections from taking place, regardless of whether or not the connecting user has authenticated. Denial of Service 3: Sending a flood of ICMP redirects will cause the router to stop routing packets. It will take approximately 30 seconds for the router to recover, once the flood has stopped. Denial of Service 4: The router will accept and apply RIP packets originating on both interfaces. This allows an attacker to cause packets to no longer route correctly, or possibly route traffic through...
A number of vulnerabilities exist in the Netgear ISDN RH348 and RT328 routers, made by Nortel networks. These vulnerabilities can result in the denial of traffic flowing through the router, as well as prevent effective management of the router. Denial of Service 1: It has been reported that SYN scanning the router, using a tool like NMAP, will render telnet connectivity to these routers nonexistent. Denial of Service 2: Establishing a telnet connection to the router will prevent any other connections from taking place, regardless of whether or not the connecting user has authenticated. Denial of Service 3: Sending a flood of ICMP redirects will cause the router to stop routing packets. It will take approximately 30 seconds for the router to recover, once the flood has stopped. Denial of Service 4: The router will accept and apply RIP packets originating on both interfaces. This allows an attacker to cause packets to no longer route correctly, or possibly route traffic through another machine. Denial of Service 5: Sending a single UDP packet of between 63000 and 65000 bytes will cause the router to stop routing packets for up to 30 seconds. Denial of Service 6: Certain types of legitimate traffic behave poorly when running NAT. These services include things like IRC DCC and Real Audio/Video. Denial of Service 7: Traffic is often dropped in NAT mode when the router has been connected for over 12 hours. Active connections will not be dropped, but new connections can not be established.