Handler on Duty: Jan Kopriva
Threat Level: green
Podcast Detail
SANS Stormcast Wednesday, January 7th, 2026: Tailsnitch Review; D-Link DSL EoL Vuln; TOTOLINK Unpatched Vuln
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9756.mp3
My Next Class
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
Tool Review: Tailsnitch
Tailsnitch is a tool to audit your Tailscale configuration. It does a comprehensive analysis of your configuration and suggests (or even applies) fixes.
https://isc.sans.edu/diary/Tool%20Review%3A%20Tailsnitch/32602
D-Link DSL Command Injection via DNS Configuration Endpoint
A new vulnerability in very old D-Link DSL modems is currently being exploited.
https://www.vulncheck.com/advisories/dlink-dsl-command-injection-via-dns-configuration-endpoint
TOTOLINK EX200 firmware-upload error handling can activate an unauthenticated root telnet service
TOTOLINK extenders may start a telnet server and allow unauthenticated access if a firmware update fails.
https://kb.cert.org/vuls/id/295169
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 20th - Jun 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 26th 2026 |
Podcast Transcript
Hello and welcome to the Wednesday, January 7th, 2026 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu Master's Degree Program in Information Security Engineering. Yesterday, I briefly mentioned the tool TailSnitch. I just got across it yesterday and I thought it was interesting in particular, since yesterday I talked sort of about KVMs, the remote access that often uses TailScale VPNs. Well, today I took a little bit time to closer look at TailSnitch and it's a pretty impressive and useful tool. So the goal of TailSnitch is to audit your TailScale configuration. TailScale itself, it's a pretty solid system as far as VPNs go, but of course a lot of it also depends on how you configure it. And TailSnitch will point out some of the possible misconfigurations that you're running into. And yes, it does this very well. It's very comprehensive, the tool. In my case, it found two systems that I had that had an old version of TailScale running. So basically, auto update wasn't configured correctly. Fix that and that's something nice to point out. It also points out things like, for example, access tokens that you issued and set to not expire. In my case, I intentionally did it that way. Overall, what I also find is that the severity levels it assigns, I think, are rather reasonable. A lot of tools like this tend to sort of, you know, a little bit overhype kind of some of the configuration issues that they're detecting. I haven't really seen this so far here in TailSnitch. It's also easy to install the tool. It comes as a binary, but you can also create it from source. It's written in Go. It's open source and free. And yes, certainly valuable if you're running TailScale to occasionally use this tool. There are two modes you can run it in. You can run it sort of in a detection only mode. And that's what I did. In this case, it only needs read access to your configuration. There is an automatic fix option that I didn't play with. I was a little bit too scared for it to sort of mess up my network. But for a smaller network, I don't think that's necessary really to use the automatic fix option. It's probably better just not a couple issues it finds to manually address them. And then we do have a new vulnerability in very old equipment. And dealing DSL modems, some of them haven't been supported since 2013. And new vulnerability in those modems is now being exploited. The target here is the DNS configuration script, dnscfg .cgi. This has been a target of prior attacks. I looked through our database and we did have plenty of attacks going back sort of until 2010s kind of that tried to attempt to change the DNS configuration. This was a known issue where basically changing DNS configuration did not require authentication. That has been fixed. However, these new flaws, of course, given how old these devices are, will not be fixed. And these are code execution vulnerabilities. Very classic problem here where you have these scripts that update configuration files. If you aren't careful, well, then that can lead to OS command injection. And with that to command execution on the vulnerable device. This is certainly one of those things where you must replace the device. Given how old they are, I'm surprised they're still around. They're still working. If you really love the device for some of them, you can actually get OpenWrt. And with that sort of install an up-to-date firmware on the device. And talking about end -of-life devices with new vulnerabilities. The next one we have here is TOTOLink EX200 extender. This particular device suffers from an interesting vulnerability where an interrupted firmware update may actually trigger a Telnet server being started without authentication. I can see this sort of as a fail -safe feature where in case your firmware update fails, it starts up that Telnet server to allow you to fix any problems. It's not clear how easily this particular behavior is triggered inadvertently. But certainly one of those things that you want to check is, hey, is there a Telnet server running on my devices? A simple port scan of your network probably will tell you that pretty easily. No patches available for this. It doesn't appear that these devices are actually officially end-of -life. However, the last update released was in 2023. So with that, two plus years ago, I would probably call this device end-of-life at this point. Well, and this is it for today. So thanks for listening and thanks for liking. Thanks for subscribing. Remember, I do have that challenge. If you find mistakes in the podcast, let me know and I'll send you a sticker. So thanks and talk to you again tomorrow. Bye. Bye. Bye. Bye. Bye.





