The Shadowserver Foundation

Vulnerable Netis Router Scanning Project

If you are looking at this page, then more than likely, you noticed a scan coming from this server across your network and/or poking at port 53413/udp.

As was recently reported by Trend Micro, a backdoor on port 53413/udp is present on many routers produced by Netcore under the Netis brand name.

Given the sheer number of Netis devices that are in use and the amount of damage that could be caused by miscreants exploiting this vulnerability, The Shadowserver Foundation decided to initiate a project to search for publicly accessible Netis devices that show signs of having this backdoor service running. The goal of this project is to identify the vulnerable systems and report them back to the network owners for remediation.

These devices have the potential to be completely compromised by miscreants and used in whatever way they see fit. If at all possible, we would like to see these devices made un-available to miscreants that would misuse them.

Information on these vulnerable devices has been incorporated into our reports and are being reported on a daily basis.

More information on this vulnerabilty can be found on Trend Micro's blog at: http://blog.trendmicro.com/trendlabs-security-intelligence/netis-routers-leave-wide-open-backdoor/

Methodology

We are querying all computers with routable IPv4 addresses that are not firewalled from the internet on port 53413/udp with a carriage return and capturing the response. We intend no harm, but if we are causing problems, please contact us at gro [tod] revfooreswodahs [ta] nacbarssnd

If you would like to test your own device to see if contains the Netis/NetCore backdoor, try the command: "nc -u [IP] 53413" and press enter. If the text "Login" appears, then your device has the backdoor accessible. If your system does not have the command "nc", it may also be called "netcat".

Whitelisting

To be removed from this set of scanning you will need to send an email to dnsscan [at] shadowserver [dot] org with the specific CIDR's that you would like to have removed. You will have to be the verifiable owner of these CIDR's and be able to prove that fact. Any address space that is whitelisted will be publicly available here: https://netisscan.shadowserver.org/exclude.html

Useful Links

Scan Status

Statistics on current run

Other Statistics

If you would like other statistics and information on historical trends, please take a look at: https://netisscan.shadowserver.org/stats/. Otherwise, stats from the most current scan are listed below.


All Vulnerable Netis Devices

All netis

(Click image to enlarge)

If you would like to see more regions click here

All Vulnerable Netis Devices

All netis

(Click image to enlarge)



If you would like us to not scan your network, please let us know and we will remove your networks from the scan.

Likewise, if you have anymore questions please feel free to send us an email at: gro [tod] revfooreswodahs [ta] nacbarssnd

The Shadowserver Foundation