In article <slrnngnbq4.o...@wb.home.test>
A user can reset the modem and erase every setting in it a
thousand times a day, matters naught. It will resume correct
operation every single time when it gets an IP address assigned
to it and the bootp config file is delivered. A user cannot
reset the contents of the modem bootp config file provided by
the provider DHCP server. Every type of modem has a specfic
bootp config file.
>
> > BUT, an attacker has to be ON a PRIVATE RFC 1918 network,
> > inaccessible from the Internet in ALL cases.
>
> But you do not understand the exploit. As far as the modem is
> concerned it saw the reset from the user on the LAN.
What exploit? It's not an "exploit". It was intentionally
designed that way.
> > They would also have to connect to each modem in order to
> > accomplish said feat.
>
> They don't have to. The user gets it when looking at an infected web page.
Yeah...? And you're going to get all the existing SB6141 modem
owners to access that webpage how?
> As the article indicated it is a LAN side exploit.
Therefore impossible to execute directly from the WAN side.
> > It would take a very long time to scan
> > the entire address space and find any modems in it.
>
> Just how many users do you think get into their modem and change the
> LAN gateway address.
None, because they can't change it.
Irrelevant since the modem is bridging a public address and
gateway to whatever is connected on the other side of it in the
LAN anyway.