Internet of Things

Researchers spotted a hidden backdoor in Chinese IoT devices from the firm DblTek

Security experts at Trustwave have discovered a hidden backdoor in Internet of Things devices manufactured by the Chinese firm DblTek.

Researchers from Trustwave have discovered a backdoor in IoT devices manufactured by a Chinese vendor that is refusing to fix it.

The backdoored devices are produced by the VoIP firm Dbltek, the researchers speculate the backdoor was introduced for debugging purposes.

The experts discovered that the Telnet interface of the GoIP has an undocumented user, namely “dbladm,” which provides root level shell access on the device. The account is not protected by a password, instead, it is protected by a proprietary challenge-response authentication scheme.

Dbltek GoIPDbltek GoIP

When the attacker tries to Telnet into the device as dbladm, the IoT component tries to connect to UDP port 11000 on 192.168.2.1 on the local network. If the flawed device receives a valid response, it grants access.

“Trustwave recently reported a remotely exploitable issue in the Telnet administrative interface of numerous DblTek branded devices. The issue permits a remote attacker to gain a shell with root privileges on the affected device due to a vendor backdoor in the authentication procedure.” reads the analysis published by Trustwave.

The researchers ethically reported the issue to the IoT vendor, but the manufacturer issued a new firmware with minor changes that leave the access open.

Dbltek then has closed any contact with Trustwave that has continued the analysis of the backdoor and has written the PoC exploits for the backdoors in both the old and new firmware versions.

The flawed firmware is present in almost all Dbltek GSM-to-VoIP devices that are mostly used by small to medium size businesses.

An internet scan for vulnerable devices revealed the existence of hundreds of devices online.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – Dbltek, VoIP )

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide

Chinese "kill switches" found in Chinese-made power inverters in US solar farm equipment that could…

41 minutes ago

US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials

FBI warns ex-officials are targeted with deepfake texts and AI voice messages impersonating senior U.S.…

17 hours ago

Shields up US retailers. Scattered Spider threat actors can target them

Google warns that the cybercrime group Scattered Spider behind UK retailer attacks is now targeting…

20 hours ago

U.S. CISA adds Google Chromium, DrayTek routers, and SAP NetWeaver flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display:none;"></gwmw>

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chromium, DrayTek routers, and SAP NetWeaver…

1 day ago

Pwn2Own Berlin 2025 Day Two: researcher earned 150K hacking VMware ESXi

On day two of Pwn2Own Berlin 2025, participants earned $435,000 for demonstrating zero-day in SharePoint,…

2 days ago

New botnet HTTPBot targets gaming and tech industries with surgical attacks

New botnet HTTPBot is targeting China's gaming, tech, and education sectors, cybersecurity researchers warn. NSFOCUS …

2 days ago