05-03-2018 06:56 PM
I have run a network scan using Avast Free Antivirus - and it has found a vulnerability on my 4GEE Mini router. (see message below)
"We have identified the following problem with your router or Wi-Fi hotspot device:
DnsMasq heap buffer overflow vulnerability
The affected device's DNS service is running an outdated version of the DnsMasq software which is known to have a heap buffer overflow vulnerability. A remote attacker can gain control of your network device and your Internet connection by sending malformed DNS packets to the device. It allows the attacker to intercept connections and perform a traffic hijack, or execute arbitrary code with unrestricted privileges as well as access all important and private data stored on the device -- your device login/password combination, your Wi-Fi password, and your configuration data.
Any device connected to your network, including computers, phones, tablets, printers, security cameras, or any other networked device in your home or office network, may have an increased risk of compromise.
The issue was fixed in DnsMasq software version 2.78, released in October 2017.
To solve the vulnerability on your device, apply the firmware or system update that contains DnsMasq software version 2.78 or higher provided by your device's manufacturer.
If an update addressing the vulnerability is not yet available for your device, you can secure your router or Wi-Fi hotspot with a strong password to minimize risks imposed by the vulnerability. We also advise you not to visit suspicious websites or run software from questionable sources."
Have EE yet released a firmware upgrade to address this issue (ie. are EE aware that the DnsMasq software requires to be upgraded to v2.78 asap??)
I have checked for firmware updates on my router admin page but it says my router firmware is "up to date"...
Your thoughts please?
06-03-2018 12:10 AM
The "remote attacker" would need to be within WiFi range of your router at the very least.
07-03-2018 05:07 PM
Same with the new 4GEE HH70VB model
dnsmasq-dhcpv6 - 2.73-1
Not a huge risk - but there will be some POC scripts out there that does it from a webpage that your browsing.
You could always manually set your dns servers on the devices to something other than the router [188.8.131.52 / 184.108.40.206 are two example public dns servers from google]
30-05-2018 07:19 AM
Thanks for the updates so far but it looks like there's no solution is that right?
If there is no current firmware update to counter this issue from EE - Isn't that a bit of a risk to customers?
by bazcad Friday
by retsam67 3 weeks ago