A security researcher of /dev/ttyS0 reverse engineered the firmware of a DLink DIR-100. He found it was possible to gain access to the administrative interface of this device by changing the browser’s user-agent to “xmlset_roodkcableoj28840ybtide” (without the quotes).
Read more here. It is also believed that this works on other DLink models as well.
If you own a DLink router, please test this and report the model number in this thread.
Thanks!
0xDC
Here’s a list of affected models:
DLink
DIR-100
DI-524
DI-524UP
DI-604S
DI-604UP
DI-604+
TM-G5240
Planex
Planex routers also seem to use the same firmware.
BRL-04UR
BRL-04CW