Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: Suspected Mass Exploit Against Linksys E1000 / E1200 Routers - SANS Internet Storm Center SANS ISC InfoSec Forums

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Suspected Mass Exploit Against Linksys E1000 / E1200 Routers

Brett, who operates an ISP in Wyoming, notified us that he had a number of customers with compromissed Linksys routers these last couple of days. The routers, once compromissed, scan port 80 and 8080 as fast as they can (saturating bandwidth available). 

It is not clear which vulnerability is being exploited, but Brett eliminated weak passwords. E1200 routers with the latest firmware (2.0.06) appear to be immune agains the exploit used. E1000 routers are end-of-life and don't appear to have an immune firmware available.

As indicators, look for E1000/1200 routers which scan IP addresses sequentially on port 80/8080. Some of the routers may have modified DNS settings to point to Google's DNS server ( or 

If you have any insight, please let us know.

Johannes B. Ullrich, Ph.D.
SANS Technology Institute


3245 Posts
ISC Handler
Might have something to do with this 0-day exploit
Mr. D

1 Posts Posts
It's possible it's related to this issue, which was blogged about by one of my fellow researchers in May...

3 Posts Posts
Yes. This is the kind of vulnerability that would come in play here. I just refined my honeypots a bit better so hopefully we will get an exploit captured soon.

3245 Posts Posts
ISC Handler
Also, I have the E1000's and an E1200 that I bought when that research was being performed.

So, if you need some testing done, let me know and I will power them up.

3 Posts Posts
I came across the following article:

It mentions recent malicious activity observed on home-based routers. Vulnerabilities are exploited on them to allow attackers to remotely change the DNS configuration and perform malicious redirections.

1 Posts Posts

Sign Up for Free or Log In to start participating in the conversation!