User Tools

Site Tools


intel

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
intel [2019-11-27 05:47:08] – external edit 127.0.0.1intel [2023-10-12 17:00:40] (current) – [Remarks] jenda
Line 50: Line 50:
   * [[http://betanews.com/2015/09/07/time-to-patch-your-firmware-backdoor-discovered-into-seagate-nas-drives/|Seagate]]   * [[http://betanews.com/2015/09/07/time-to-patch-your-firmware-backdoor-discovered-into-seagate-nas-drives/|Seagate]]
   * [[https://www.techdirt.com/blog/wireless/articles/20111213/00271717060/fbi-admits-that-it-uses-carrier-iq-law-enforcement-purposes-wont-say-how.shtml|HTC]], [[http://gizmodo.com/5868732/the-complete-list-of-all-the-phones-with-carrier-iq-spyware-installed|AT&T]]   * [[https://www.techdirt.com/blog/wireless/articles/20111213/00271717060/fbi-admits-that-it-uses-carrier-iq-law-enforcement-purposes-wont-say-how.shtml|HTC]], [[http://gizmodo.com/5868732/the-complete-list-of-all-the-phones-with-carrier-iq-spyware-installed|AT&T]]
-  * [[https://github.com/elvanderb/TCP-32764|Cisco, Linksys, NetGear]], [[http://www.theregister.co.uk/2014/07/02/cisco_you_cant_just_leave_your_ssh_keys_lying_around/|Cisco again]] and [[https://web.archive.org/web/20161010130021/https://www.helpnetsecurity.com/2016/01/14/cisco-kills-hardcoded-password-bug-in-wi-fi-access-points/|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n3k|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm2|again]] and [[http://thehackernews.com/2014/04/router-manufacturers-secretly-added-tcp.html|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-policy-cm-default-psswrd|again]] and [[https://nvd.nist.gov/vuln/detail/CVE-2019-1804|again]].+  * [[https://github.com/elvanderb/TCP-32764|Cisco, Linksys, NetGear]], [[http://www.theregister.co.uk/2014/07/02/cisco_you_cant_just_leave_your_ssh_keys_lying_around/|Cisco again]] and [[https://web.archive.org/web/20161010130021/https://www.helpnetsecurity.com/2016/01/14/cisco-kills-hardcoded-password-bug-in-wi-fi-access-points/|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-n3k|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm2|again]] and [[http://thehackernews.com/2014/04/router-manufacturers-secretly-added-tcp.html|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc|again]] and [[https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-policy-cm-default-psswrd|again]] and [[https://nvd.nist.gov/vuln/detail/CVE-2019-1804|again]] and [[https://www.schneier.com/blog/archives/2023/10/cisco-cant-stop-using-hard-coded-passwords.html|again]].
   * [[http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor|Samsung]]   * [[http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor|Samsung]]
   * [[http://sekurak.pl/tp-link-httptftp-backdoor/|TP-Link]]   * [[http://sekurak.pl/tp-link-httptftp-backdoor/|TP-Link]]
Line 65: Line 65:
   * [[http://gulftech.org/advisories/WDMyCloud%20Multiple%20Vulnerabilities/125|WD]]   * [[http://gulftech.org/advisories/WDMyCloud%20Multiple%20Vulnerabilities/125|WD]]
   * [[https://en.wikipedia.org/wiki/Printer_steganography|"All" laser printer manufacturers]]   * [[https://en.wikipedia.org/wiki/Printer_steganography|"All" laser printer manufacturers]]
 +  * [[https://www.eyecontrol.nl/blog/undocumented-user-account-in-zyxel-products.html|Zyxel]]
 +  * [[https://heimdalsecurity.com/blog/qnap-removes-backdoor-account/|QNAP]]
intel.1574830028.txt.gz · Last modified: 2019-11-27 05:47:08 by 127.0.0.1

Except where otherwise noted, content on this wiki is licensed under the following license: Public Domain
Public Domain Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki