cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
426
Views
0
Helpful
0
Replies

RV325 Serious Bugs in v1.2.1.14

edward.chan2015
Level 1
Level 1

I am a new user of RV325 and found the following bugs:

1.  When the router is rebooted, it will return to default SSL cert with the following details:

  SSL Certificate:
    Version: 2
    Serial Number: -15523931243224227333
    Signature Algorithm: md5WithRSAEncryption
    Issuer: /C=TW/ST=Hsinchu/L=Hsinchu/O=Qno Technology Inc./OU=Product Development/CN=qno.com.tw/emailAddress=fae@qno.com.tw
    Not valid before: Jul 10 02:13:16 2007 GMT
    Not valid after: Jul  9 02:13:16 2012 GMT
    Subject: /C=TW/ST=Hsinchu/L=Hsinchu/O=Qno Technology Inc./OU=Product Development/CN=qno.com.tw/emailAddress=fae@qno.com.tw
    Public Key Algorithm: rsaEncryption
    RSA Public Key: (1024 bit)
      Public-Key: (1024 bit)
      Modulus:
          00:f1:c6:55:e8:63:0d:e0:4c:b9:e1:65:28:c6:4c:
          c9:e1:f5:00:fa:1f:1d:e1:30:b8:51:87:c1:9f:de:
          be:11:da:73:7d:f2:4f:4b:62:7e:38:fe:f6:64:0a:
          94:9e:9d:79:8e:57:aa:6f:fc:dc:83:86:13:83:0f:
          40:68:a0:8c:7f:ec:b8:8f:1a:3f:39:08:31:ee:d0:
          ca:c2:68:a8:57:10:65:95:29:4c:7b:2e:8d:0b:aa:
          8d:b0:ef:e9:a5:ab:a2:ec:69:f1:eb:ee:a4:9d:d5:
          98:95:46:f2:54:f9:5d:ec:5d:d0:34:fe:91:b5:48:
          85:56:9a:e7:c0:a3:c3:e9:43
      Exponent: 65537 (0x10001)
    X509v3 Extensions:
      X509v3 Subject Key Identifier:
        75:73:54:75:70:73:0E:52:61:D5:7B:36:33:BF:CC:95:C9:F0:A7:61
      X509v3 Authority Key Identifier:
        keyid:75:73:54:75:70:73:0E:52:61:D5:7B:36:33:BF:CC:95:C9:F0:A7:61
        DirName:/C=TW/ST=Hsinchu/L=Hsinchu/O=Qno Technology Inc./OU=Product Development/CN=qno.com.tw/emailAddress=fae@qno.com.tw
        serial:D7:70:15:37:65:F7:DE:05

I need to login to the box and choose the self-signed cert that I created.

Please help to fix the bugs as it will impose security risk.  I did tried to update the firmware again but still got this issues.

2.  Forwarding syslog to a local syslog server and got the following:

Jan 19 19:52:50 ALLOW TCP 119.188.10.212:58319 -> 42.2.61.37:25910 on eth1
Jan 19 19:52:56 ALLOW TCP 89.248.172.78:40161 -> 42.2.61.37:502 on eth1
Jan 19 19:55:33 ALLOW TCP 119.188.10.212:58319 -> 42.2.61.37:40941 on eth1
Jan 19 19:55:57 ALLOW TCP 119.188.10.212:58319 -> 42.2.61.37:14398 on eth1
Jan 19 19:57:09 ALLOW ICMP 121.230.193.188: -> 42.2.61.37:14398 on eth1

The "ALLOW" in fact is block and I think the current latest firmware has enabling the following of this syslog message even if I turned of everything in the syslog setting.

3.  I did adding firewall rules to limited access from certain external subnets to be able PPTP, SSL VPN & remote management.  However even if I add rules to block ALL access to UDP 500 (IPSec), IPSec connection can still be made from any external network.  Please help to fix this bug as it is very essential in my environment.

0 Replies 0