So I recently had to have the modem take over DHCP duties as my home server is currently offline. It was fine for a few days, but then suddenly sites stopped working (or responded with an invalid certificate). I checked the DNS resolvers on one of my machines and they were wrong, so I check the router and it seems the DNS resolvers set for the DHCP server page had been changed to two malicious ones.
This is incredibly concerning for a few reasons; Remote management was already turned off (and had never been turned on) and the admin password had been changed to something cryptic (which only I have access to).
Is there some sort of remote exploit available for the 8800NL routers? I'm already running the latest version of the firmware (2.32e) so there's no much more I can do here.
8800NL Compromised - DHCP DNS Resolvers Changed
-
- Posts: 1
- Joined: Thu Nov 06, 2014 8:54 pm
-
- Posts: 5398
- Joined: Tue Jul 19, 2011 4:30 pm
Re: 8800NL Compromised - DHCP DNS Resolvers Changed
The only time I have seen routers compromised is when the firewall is disabled on the WAN interfaceEnverex wrote: ↑Sun May 27, 2018 3:28 pm So I recently had to have the modem take over DHCP duties as my home server is currently offline. It was fine for a few days, but then suddenly sites stopped working (or responded with an invalid certificate). I checked the DNS resolvers on one of my machines and they were wrong, so I check the router and it seems the DNS resolvers set for the DHCP server page had been changed to two malicious ones.
This is incredibly concerning for a few reasons; Remote management was already turned off (and had never been turned on) and the admin password had been changed to something cryptic (which only I have access to).
Is there some sort of remote exploit available for the 8800NL routers? I'm already running the latest version of the firmware (2.32e) so there's no much more I can do here.
Also run a port scan and see if any ports are open eg 22, 23, 80 etc
-
- Posts: 1
- Joined: Wed Nov 14, 2012 8:37 pm
Re: 8800NL Compromised - DHCP DNS Resolvers Changed
Could it be the Billion router is compromised by the same vulnerability as Draytek?billion_fan wrote: ↑Tue May 29, 2018 9:44 amThe only time I have seen routers compromised is when the firewall is disabled on the WAN interfaceEnverex wrote: ↑Sun May 27, 2018 3:28 pm So I recently had to have the modem take over DHCP duties as my home server is currently offline. It was fine for a few days, but then suddenly sites stopped working (or responded with an invalid certificate). I checked the DNS resolvers on one of my machines and they were wrong, so I check the router and it seems the DNS resolvers set for the DHCP server page had been changed to two malicious ones.
This is incredibly concerning for a few reasons; Remote management was already turned off (and had never been turned on) and the admin password had been changed to something cryptic (which only I have access to).
Is there some sort of remote exploit available for the 8800NL routers? I'm already running the latest version of the firmware (2.32e) so there's no much more I can do here.
Also run a port scan and see if any ports are open eg 22, 23, 80 etc
https://www.draytek.com/en/about/news/2 ... ek-routers
-
- Posts: 5398
- Joined: Tue Jul 19, 2011 4:30 pm
Re: 8800NL Compromised - DHCP DNS Resolvers Changed
Our engineers have checked this and said our Billion devices are not compromised (see below)alexp999 wrote: ↑Tue May 29, 2018 12:31 pmCould it be the Billion router is compromised by the same vulnerability as Draytek?billion_fan wrote: ↑Tue May 29, 2018 9:44 amThe only time I have seen routers compromised is when the firewall is disabled on the WAN interfaceEnverex wrote: ↑Sun May 27, 2018 3:28 pm So I recently had to have the modem take over DHCP duties as my home server is currently offline. It was fine for a few days, but then suddenly sites stopped working (or responded with an invalid certificate). I checked the DNS resolvers on one of my machines and they were wrong, so I check the router and it seems the DNS resolvers set for the DHCP server page had been changed to two malicious ones.
This is incredibly concerning for a few reasons; Remote management was already turned off (and had never been turned on) and the admin password had been changed to something cryptic (which only I have access to).
Is there some sort of remote exploit available for the 8800NL routers? I'm already running the latest version of the firmware (2.32e) so there's no much more I can do here.
Also run a port scan and see if any ports are open eg 22, 23, 80 etc
https://www.draytek.com/en/about/news/2 ... ek-routers
In terms of draytek's case, the hacker may use CSRF to tamper with http's request and modify the dns to generate follow-up problems.
The last time we encountered a similar problem, our code should currently have no way to execute any scripts, but we still advise customers
1. Remote access try to disable, if you want to open only accept specific ip access
2. Change the password to a more secure configuration. Do not use the default setting.
3. If the website has https, it is safer to use https instead of http