Next revision | Previous revision |
intel [2019-11-27 05:47:08] – external edit 127.0.0.1 | intel [2023-10-12 17:00:40] (current) – [Remarks] jenda |
---|
* [[http://betanews.com/2015/09/07/time-to-patch-your-firmware-backdoor-discovered-into-seagate-nas-drives/|Seagate]] | * [[http://betanews.com/2015/09/07/time-to-patch-your-firmware-backdoor-discovered-into-seagate-nas-drives/|Seagate]] |
* [[https://www.techdirt.com/blog/wireless/articles/20111213/00271717060/fbi-admits-that-it-uses-carrier-iq-law-enforcement-purposes-wont-say-how.shtml|HTC]], [[http://gizmodo.com/5868732/the-complete-list-of-all-the-phones-with-carrier-iq-spyware-installed|AT&T]] | * [[https://www.techdirt.com/blog/wireless/articles/20111213/00271717060/fbi-admits-that-it-uses-carrier-iq-law-enforcement-purposes-wont-say-how.shtml|HTC]], [[http://gizmodo.com/5868732/the-complete-list-of-all-the-phones-with-carrier-iq-spyware-installed|AT&T]] |
* [[https://github.com/elvanderb/TCP-32764|Cisco, Linksys, NetGear]], [[http://www.theregister.co.uk/2014/07/02/cisco_you_cant_just_leave_your_ssh_keys_lying_around/|Cisco again]] and [[https://web.archive.org/web/20161010130021/https://www.helpnetsecurity.com/2016/01/14/cisco-kills-hardcoded-password-bug-in-wi-fi-access-points/|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n3k|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm2|again]] and [[http://thehackernews.com/2014/04/router-manufacturers-secretly-added-tcp.html|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-policy-cm-default-psswrd|again]] and [[https://nvd.nist.gov/vuln/detail/CVE-2019-1804|again]]. | * [[https://github.com/elvanderb/TCP-32764|Cisco, Linksys, NetGear]], [[http://www.theregister.co.uk/2014/07/02/cisco_you_cant_just_leave_your_ssh_keys_lying_around/|Cisco again]] and [[https://web.archive.org/web/20161010130021/https://www.helpnetsecurity.com/2016/01/14/cisco-kills-hardcoded-password-bug-in-wi-fi-access-points/|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n3k|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm2|again]] and [[http://thehackernews.com/2014/04/router-manufacturers-secretly-added-tcp.html|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-policy-cm-default-psswrd|again]] and [[https://nvd.nist.gov/vuln/detail/CVE-2019-1804|again]] and [[https://www.schneier.com/blog/archives/2023/10/cisco-cant-stop-using-hard-coded-passwords.html|again]]. |
* [[http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor|Samsung]] | * [[http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor|Samsung]] |
* [[http://sekurak.pl/tp-link-httptftp-backdoor/|TP-Link]] | * [[http://sekurak.pl/tp-link-httptftp-backdoor/|TP-Link]] |
* [[http://gulftech.org/advisories/WDMyCloud%20Multiple%20Vulnerabilities/125|WD]] | * [[http://gulftech.org/advisories/WDMyCloud%20Multiple%20Vulnerabilities/125|WD]] |
* [[https://en.wikipedia.org/wiki/Printer_steganography|"All" laser printer manufacturers]] | * [[https://en.wikipedia.org/wiki/Printer_steganography|"All" laser printer manufacturers]] |
| * [[https://www.eyecontrol.nl/blog/undocumented-user-account-in-zyxel-products.html|Zyxel]] |
| * [[https://heimdalsecurity.com/blog/qnap-removes-backdoor-account/|QNAP]] |