{"id":13325,"date":"2018-09-10T08:10:15","date_gmt":"2018-09-10T16:10:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/09\/10\/news-7092\/"},"modified":"2018-09-10T08:10:15","modified_gmt":"2018-09-10T16:10:15","slug":"news-7092","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/09\/10\/news-7092\/","title":{"rendered":"Assessing the security of a portable router: a look inside its hardware"},"content":{"rendered":"<p><strong>Credit to Author: Jean Taggart| Date: Mon, 10 Sep 2018 15:00:00 +0000<\/strong><\/p>\n<p>Network administrators should perform security assessments of hardware that they will provide their users, or particularly paranoid users might want to poke at their devices just to be extra sure.<\/p>\n<p>In this blog post, we will demonstrate the techniques used to assess security on a generic portable router purchased online. We have redacted its identifiable information as our goal here isn\u2019t to provide a free penetration test to the hardware manufacturer. (Someone enterprising enough could still figure this out.)<\/p>\n<p>Can we actually trust this device? This was an inexpensive router, and probably assembled with off-the-shelf components.<\/p>\n<p>In order to assess how secure this device really is, we are going to have to take it apart and figure out what makes it tick.<\/p>\n<h3>The packaging<\/h3>\n<p>The router came in a small box covered in helpful information about its capabilities, with the only brand attribution being a silver sticker with [REDACTED] written on it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25356\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/redacted-box-600x555\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/redacted-box-600x555.png\" data-orig-size=\"600,555\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"redacted-box-600&#215;555\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/redacted-box-600x555-300x278.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/redacted-box-600x555-600x555.png\" class=\"size-large wp-image-25356 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/redacted-box-600x555-600x555.png\" alt=\"\" width=\"600\" height=\"555\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/redacted-box-600x555.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/redacted-box-600x555-300x278.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25357\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/redactedsticker_label\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/redactedsticker_label.png\" data-orig-size=\"372,273\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"[redacted]sticker_label\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/redactedsticker_label-300x220.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/redactedsticker_label.png\" class=\"size-full wp-image-25357 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/redactedsticker_label.png\" alt=\"\" width=\"372\" height=\"273\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/redactedsticker_label.png 372w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/redactedsticker_label-300x220.png 300w\" sizes=\"auto, (max-width: 372px) 100vw, 372px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>It looks like a device made by a third party and re-branded to quickly bolster the product offerings of another company. A quick Google search did not yield a website for this product on the first page of results, but more digging did reveal a manufacturer that we will not disclose here.<\/p>\n<p>Perusing their product line, we were able to find the\u00a0router\u00a0we had purchased.\u00a0We located a firmware update and downloaded it for further investigation. More on this later.<\/p>\n<h3>Gathering equipment<\/h3>\n<p>Once we received the router, the first thing we did was disassemble it. The best tool to do this is the\u00a0<a href=\"https:\/\/www.ifixit.com\/Store\/Tools\/Pro-Tech-Toolkit\/IF145-307-4\" target=\"_blank\" rel=\"noopener\">ifixit tool kit.<\/a><\/p>\n<p>This is the gold standard for disassembling stuff. It comes with many of the esoteric fastener heads devised to frustrate anyone trying to take things apart.<\/p>\n<p>This mini router had no visible screws\u2014this is a trend for many devices as of late. Disassembly required the use of the \u201cspudge tool\u201d from the ifixit toolkit, and we gently pried the cover off. Thankfully, there weren\u2019t any of the warranty \u201cvoid if tampered\u201d stickers. These are\u00a0<a href=\"https:\/\/www.ftc.gov\/news-events\/press-releases\/2018\/04\/ftc-staff-warns-companies-it-illegal-condition-warranty-coverage\" target=\"_blank\" rel=\"noopener\">illegal<\/a>.<\/p>\n<p>Taking the router apart revealed the main router board with two antennae and one chip in the center. The main chip in the center was an MIPS processor, and there\u2019s a specific model number silk screened onto the mainboard.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24506\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/router_mobo\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/router_mobo.png\" data-orig-size=\"451,341\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"router_mobo\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/router_mobo-300x227.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/router_mobo.png\" class=\"size-full wp-image-24506 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/router_mobo.png\" alt=\"\" width=\"451\" height=\"341\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/router_mobo.png 451w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/router_mobo-300x227.png 300w\" sizes=\"auto, (max-width: 451px) 100vw, 451px\" \/><\/p>\n<p>Some light Googling revealed that this chipset has a manufacturer website and even a\u00a0product-specific page.<\/p>\n<p>I also found a WikiDevi page on our\u00a0exact model.\u00a0WikiDevi\u00a0is a user-editable database for computer hardware based on\u00a0MediaWiki\u00a0and\u00a0Semantic MediaWiki. This page contains a ton of good info on the chipset, its capabilities, where it is sold, and by who.<\/p>\n<p>Let\u2019s file those tidbits of information away for now. We\u2019ll come back to them later.<\/p>\n<p>The board has four unpopulated pin holes. These are typically called either \u201cplated-through holes\u201d or \u201cannular rings.\u201d We will just refer to them as plated-through holes for this exercise.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24509\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/uart_mobo-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart_mobo-1.png\" data-orig-size=\"409,300\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"uart_mobo\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart_mobo-1-300x220.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart_mobo-1.png\" class=\"size-full wp-image-24509 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart_mobo-1.png\" alt=\"\" width=\"409\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart_mobo-1.png 409w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart_mobo-1-300x220.png 300w\" sizes=\"auto, (max-width: 409px) 100vw, 409px\" \/><\/p>\n<p>This looks suspiciously like an interface that the manufacturer left on the mainboard. These plated-through holes are usually used to flash the operating system onto the board and test the unit at the factory to verify everything is working properly. There\u2019s no attempt made to hide its purpose.<\/p>\n<p>After some light digging on\u00a0the product website, we did find mention of the slow I\/O features of this chipset.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24510\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/uart\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart.png\" data-orig-size=\"239,47\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"uart\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart.png\" class=\"size-full wp-image-24510 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart.png\" alt=\"\" width=\"239\" height=\"47\" \/><\/p>\n<p>Further, Googling showed that this pinout is fairly common and might be of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Universal_asynchronous_receiver-transmitter\" target=\"_blank\" rel=\"noopener\">UART variety.<\/a><\/p>\n<p>There\u2019s mention of UART on the [REDACTED] product page. This looks promising, like a good place to start. But the plated-through holes are in an awkward position, and examining the mainboard is difficult.<\/p>\n<h3>More equipment<\/h3>\n<p>In order to get a better look, we did some online shopping. We purchased a \u201cthird\u00a0hand\u201d to hold the mainboard. This portable router is bolted straight to a transformer for the sake of compactness. This means we are in the proximity of\u00a0120 Volts,\u00a0so we should exercise a modicum of caution.<\/p>\n<p>This device is compact and tightly integrated. The chips on the mainboard are pretty small, and our eyesight isn\u2019t what it used to be. Back to the Internet to get a jeweler\u2019s lamp.<\/p>\n<p style=\"padding-left: 390px;\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24511\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/jewelers_lamp\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/jewelers_lamp.png\" data-orig-size=\"521,493\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"jewelers_lamp\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/jewelers_lamp-300x284.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/jewelers_lamp.png\" class=\"aligncenter wp-image-24511 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/jewelers_lamp.png\" alt=\"\" width=\"521\" height=\"493\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/jewelers_lamp.png 521w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/jewelers_lamp-300x284.png 300w\" sizes=\"auto, (max-width: 521px) 100vw, 521px\" \/><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24512\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/3rd_arm\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/3rd_arm.png\" data-orig-size=\"414,685\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"3rd_arm\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/3rd_arm-181x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/3rd_arm-363x600.png\" class=\"aligncenter wp-image-24512 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/3rd_arm-363x600.png\" alt=\"\" width=\"363\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/3rd_arm-363x600.png 363w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/3rd_arm-181x300.png 181w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/3rd_arm.png 414w\" sizes=\"auto, (max-width: 363px) 100vw, 363px\" \/><\/p>\n<p>So now we had the magnifying lamp, and it is much better than the little one that comes with the third hand. The LED lights also made examining the main board much easier.<\/p>\n<p>To interact with these pins, we could solder wires in, but we\u2019re planning on using this device, provided it passes muster. This meant we were going to try and be as delicate with our probing as we could. Back to the Internet. After some searching, we found breakaway headers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24513\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/breakout\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/breakout.png\" data-orig-size=\"310,267\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"breakout\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/breakout-300x258.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/breakout.png\" class=\"size-full wp-image-24513 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/breakout.png\" alt=\"\" width=\"310\" height=\"267\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/breakout.png 310w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/breakout-300x258.png 300w\" sizes=\"auto, (max-width: 310px) 100vw, 310px\" \/><\/p>\n<p>Snapping four off the length make for a perfect pinout adapter. No solder needed, plus easy access for eventually connecting the USB header and for probing the pins.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24514\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/4pins_installed\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/4pins_installed.png\" data-orig-size=\"441,304\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"4pins_installed\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/4pins_installed-300x207.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/4pins_installed.png\" class=\"size-full wp-image-24514 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/4pins_installed.png\" alt=\"\" width=\"441\" height=\"304\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/4pins_installed.png 441w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/4pins_installed-300x207.png 300w\" sizes=\"auto, (max-width: 441px) 100vw, 441px\" \/><\/p>\n<h3>Shopping<\/h3>\n<p>Now we needed to investigate what those diagnostic pins were. Did they have voltage? Were they used to send and receive information? Back to the Internet again for more shopping.<\/p>\n<p>Not wanting to buy something too cheap or inappropriate for the task, we Googled affordable voltmeter and found a\u00a0<a href=\"http:\/\/www.multimeterguru.com\/best-cheap-tools\/\" target=\"_blank\" rel=\"noopener\">review<\/a>\u00a0for decent and affordable voltmeters. We\u00a0settled on the Extech EX330 Autoranging Mini Multi-Meter with Built-In Thermometer and Type K Remote Probe.<\/p>\n<p>We also purchased the additional probe connectors kit for good measure. We started with checking for voltage. The bottom half of the router is the transformer. It typically steps down from 120 Volts to 12 Volts. We set the voltmeter to 200 Volts, just to be safe, and got to probing.<\/p>\n<h3>Diving in<\/h3>\n<p>The bottom plated-through hole had a square about it. Maybe it was special? So we started by applying the ground to it and power to the top pin, and the result was -3.3 Volts. Quickly inverting the probes gave us +3.3 Volts.<\/p>\n<p>Some quick Googling told us that there are two common voltages used in these types of interfaces: 3.3 Volts and 5 Volts. It looks like our router is of the 3.3 Volts variety, the top pin is ground, and the bottom square pin is positive with 3.3 Volts.<\/p>\n<p>So now we knew what the top and bottom pins were. This left the two center pins as a mystery.<\/p>\n<p>Many other much more talented people than us have gone down this particular rabbit hole, and in this, Google was invaluable. We found pictures of other UART interfaces on other routers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24515\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/uart-example-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-example-2.png\" data-orig-size=\"332,477\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"uart example 2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-example-2-209x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-example-2.png\" class=\"size-full wp-image-24515 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-example-2.png\" alt=\"\" width=\"332\" height=\"477\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-example-2.png 332w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-example-2-209x300.png 209w\" sizes=\"auto, (max-width: 332px) 100vw, 332px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24516\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/uart-example1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-example1.png\" data-orig-size=\"266,232\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"uart example1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-example1.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-example1.png\" class=\"size-large wp-image-24516 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-example1.png\" alt=\"\" width=\"266\" height=\"232\" \/><\/p>\n<p>It does not appear that there\u2019s a standardized pin order, but in most of the examples we found online, gnd (ground) and\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/VCC\">VCC<\/a>\u00a0are at the outer edges.<\/p>\n<p>In our case, VCC would stand for \u201cVoltage Common Collector.\u201d More Googling indicated that there is a cable available to interface with these pins and,\u00a0most importantly, that you don\u2019t need to connect the 3.3 Volt pin unless you want to watch your cable, your router, and potentially your computer go \u201cpoof-the-magic-dragon.\u201d<\/p>\n<p>Good to know. Let\u2019s also store this tidbit of information for later.<\/p>\n<h3>More shopping<\/h3>\n<p>So back to more shopping. We found a USB to RS232 TTL UART PL2303HX Converter USB to COM Cable Adapter Module.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24519\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/usb-to-uart-cable\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/usb-to-uart-cable.png\" data-orig-size=\"1024,1024\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"usb to uart cable\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/usb-to-uart-cable-300x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/usb-to-uart-cable-600x600.png\" class=\"size-large wp-image-24519 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/usb-to-uart-cable-600x600.png\" alt=\"\" width=\"600\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/usb-to-uart-cable-600x600.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/usb-to-uart-cable-150x150.png 150w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/usb-to-uart-cable-300x300.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/usb-to-uart-cable.png 1024w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>We also found some that specified that they came with both voltage selections and, just to be thorough, we also ordered one of these. It wasn\u2019t available with Prime, so we\u2019re still waiting for this to arrive from the slow boat from China.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24521\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/35uart\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/35UART.png\" data-orig-size=\"500,375\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"3&amp;amp;5UART\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/35UART-300x225.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/35UART.png\" class=\"size-full wp-image-24521 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/35UART.png\" alt=\"\" width=\"500\" height=\"375\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/35UART.png 500w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/35UART-300x225.png 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<h3>Back to the investigation<\/h3>\n<p>Not being one to assume anything, we also researched what the color coding was for the cable, as it came in a little bubble wrap with no instructions and sadly nothing in the packaging to indicate whether it was of the 3.3 Volts or 5 Volts variety. Similar USB to UART cables had documentation on the web. We made an assumption and theorized that the cable coloring would be the same as the Google picture results (fingers crossed).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24522\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/uart-fttl\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-fttl.png\" data-orig-size=\"520,305\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"uart fttl\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-fttl-300x176.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-fttl.png\" class=\"size-full wp-image-24522 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-fttl.png\" alt=\"\" width=\"520\" height=\"305\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-fttl.png 520w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uart-fttl-300x176.png 300w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/p>\n<h3>Roadblocks<\/h3>\n<p>Colors matched: black for ground, red for power, green for receive, white for transmit. So far, so good. We plugged in the UART to USB cable in our test machine and encountered another roadblock.<\/p>\n<p>While it was properly detected and Windows did install the correct drivers, it didn\u2019t work. Some investigation revealed the device could not start.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24524\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/device_manager-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/device_manager-1.png\" data-orig-size=\"415,121\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"device_manager\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/device_manager-1-300x87.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/device_manager-1.png\" class=\"size-large wp-image-24524 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/device_manager-1.png\" alt=\"\" width=\"415\" height=\"121\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/device_manager-1.png 415w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/device_manager-1-300x87.png 300w\" sizes=\"auto, (max-width: 415px) 100vw, 415px\" \/><\/p>\n<p>We tried moving the USB device to a different com port in the device manager with no success. We tried downloading the driver directly from the Prolific website and again weren\u2019t met with success. We also tried moving the USB device to a different port (from USB v3 to regular USB). Again, no go.<\/p>\n<p>Digging a little further into the properties of the device revealed that the device cannot start.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24556\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/device_manager_2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/device_manager_2.png\" data-orig-size=\"385,357\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"device_manager_2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/device_manager_2-300x278.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/device_manager_2.png\" class=\"size-full wp-image-24556 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/device_manager_2.png\" alt=\"\" width=\"385\" height=\"357\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/device_manager_2.png 385w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/device_manager_2-300x278.png 300w\" sizes=\"auto, (max-width: 385px) 100vw, 385px\" \/><\/p>\n<p>Researching this error yielded <a href=\"https:\/\/answers.microsoft.com\/en-us\/windows\/forum\/windows_10-hardware\/prolific-usb-to-serial-comm-port-windows-10\/0a4f8e48-7135-4434-9d10-349c9ce87fcf?auth=1\" target=\"_blank\" rel=\"noopener\">this forum post<\/a>. And more specifically, to this entry:<\/p>\n<p><strong>\u201cWindows 8\/8.1\/10 are NOT supported in PL-2303HXA and PL-2303X\u00a0<a href=\"http:\/\/www.prolific.com.tw\/US\/ShowProduct.aspx?p_id=212&amp;pcid=41\">EOL<\/a>\u00a0(End Of Life) chip versions.\u201d<\/strong><\/p>\n<p>So while this USB dongle presumably works, it won\u2019t work in Windows 10. What a surprise! Not to be easily defeated, we rebooted into Ubuntu Linux with the USB dongle still attached.<\/p>\n<p>We then proceeded to check if the USB to serial adapter was working. This is achieved by issuing this command:<\/p>\n<p>$ dmesg | grep tty<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24557\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/dmesg\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/dmesg.png\" data-orig-size=\"1055,218\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"dmesg\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/dmesg-300x62.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/dmesg-600x124.png\" class=\"size-large wp-image-24557 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/dmesg-600x124.png\" alt=\"\" width=\"600\" height=\"124\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/dmesg-600x124.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/dmesg-300x62.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/dmesg.png 1055w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>So now we know that the USB adapter is ttyUSB0. The Windows forum mentioned the pl2303 chipset in the adapter wasn\u2019t supported, and we see it here. In Windows, we would\u2019ve used the Putty terminal program. In Linux, we elected to use GtkTerm. It was installed with this command:<\/p>\n<p>$ sudo apt-get install gtkterm<\/p>\n<p>We found that for best results, invoking GtkTerm from bash needed sudo. (We suspect it needed the user account to be part of a group that has permissions to access the ports.)<\/p>\n<p>$ sudo gtkterm<\/p>\n<p>Once gtkterm was running, we needed to select the proper port. We selected the configuration option and opened the port option.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24559\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/gtkterm-comm-selection\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/gtkterm-comm-selection.png\" data-orig-size=\"612,265\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"gtkterm comm selection\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/gtkterm-comm-selection-300x130.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/gtkterm-comm-selection-600x260.png\" class=\"size-large wp-image-24559 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/gtkterm-comm-selection-600x260.png\" alt=\"\" width=\"600\" height=\"260\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/gtkterm-comm-selection-600x260.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/gtkterm-comm-selection-300x130.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/gtkterm-comm-selection-195x85.png 195w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/gtkterm-comm-selection.png 612w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>In the port drop-down menu, at the very bottom, we saw \/dev\/ttyUSB0. This is the Prolific USB adapter.<\/p>\n<p>We left parity bit, stop bit, and flow control to the defaults and hoped for the best.<\/p>\n<p>After this came the tedious task of determining which of the two pins in the center were transmit and receive, as well as the correct baud rate. Our first attempt was gnd, rx \u00a0tx and\u00a0vcc unconnected. &lt;-VCC = 3.3V = poof! bad!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24561\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/wrong_txrx\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/wrong_txrx.png\" data-orig-size=\"353,237\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"wrong_txrx\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/wrong_txrx-300x201.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/wrong_txrx.png\" class=\"size-full wp-image-24561 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/wrong_txrx.png\" alt=\"\" width=\"353\" height=\"237\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/wrong_txrx.png 353w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/wrong_txrx-300x201.png 300w\" sizes=\"auto, (max-width: 353px) 100vw, 353px\" \/><\/p>\n<p>These were the results we got. Either TX and RX are inverted, or we have selected the wrong baud rates. There is some kind of communication taking place, but the contents are all garbled. We went through the most common baud rates, but were not met with any success.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24562\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/gtkterm-wrong-baud-rate\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/gtkterm-wrong-baud-rate.png\" data-orig-size=\"751,582\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"gtkterm wrong baud rate\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/gtkterm-wrong-baud-rate-300x232.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/gtkterm-wrong-baud-rate-600x465.png\" class=\"size-large wp-image-24562 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/gtkterm-wrong-baud-rate-600x465.png\" alt=\"\" width=\"600\" height=\"465\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/gtkterm-wrong-baud-rate-600x465.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/gtkterm-wrong-baud-rate-300x232.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/gtkterm-wrong-baud-rate.png 751w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>We then flipped the TX and RX and started the process of unplugging and re-plugging the transformer portion of the router, while incrementing the available baud rates in GtkTerm. When selecting the 57600 baud rate, we were met with success!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24564\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/uart_connected\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/UART_connected.png\" data-orig-size=\"240,240\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"UART_connected\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/UART_connected.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/UART_connected.png\" class=\"size-full wp-image-24564 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/UART_connected.png\" alt=\"\" width=\"240\" height=\"240\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/UART_connected.png 240w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/UART_connected-150x150.png 150w\" sizes=\"auto, (max-width: 240px) 100vw, 240px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24678\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/success_watermark\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/success_watermark.gif\" data-orig-size=\"748,580\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"success_watermark\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/success_watermark-300x233.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/success_watermark-600x465.gif\" class=\"aligncenter wp-image-24678 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/success_watermark.gif\" alt=\"\" width=\"748\" height=\"580\" \/><\/p>\n<p>We could now see how this portable router starts up. It uses u-boot (1.1.3). As the system is starting, there is a brief moment where you are offered options:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24567\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/uboot-menu\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/Uboot-menu.png\" data-orig-size=\"752,578\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Uboot menu\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/Uboot-menu-300x231.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/Uboot-menu-600x461.png\" class=\"size-large wp-image-24567 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/Uboot-menu-600x461.png\" alt=\"\" width=\"600\" height=\"461\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/Uboot-menu-600x461.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/Uboot-menu-300x231.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/Uboot-menu.png 752w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>If you enter &#8220;4&#8221; at just the right moment, it interrupts the boot process and dumps you at a prompt. This is probably the menu used at the factory to apply the correct firmware and perform quality assurance checks and confirm that the unit isn\u2019t defective. Some of the options look like they could be destructive and brick the device, so we were careful in our selection.<\/p>\n<p>Entering \u201chelp\u201d gives you a list of the commands available at the u-boot command line.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24568\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/uboot-help\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/Uboot-help.png\" data-orig-size=\"753,583\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Uboot help\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/Uboot-help-300x232.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/Uboot-help-600x465.png\" class=\"size-large wp-image-24568 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/Uboot-help-600x465.png\" alt=\"\" width=\"600\" height=\"465\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/Uboot-help-600x465.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/Uboot-help-300x232.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/Uboot-help.png 753w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Printenv gives even further information. We could re-flash this unit. We could reset the unit. All of this is good, but doesn&#8217;t really help us ascertain the security posture of the device.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24569\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/uboot-printenv\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uboot-printenv.png\" data-orig-size=\"747,586\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"uboot printenv\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uboot-printenv-300x235.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uboot-printenv-600x471.png\" class=\"size-large wp-image-24569 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uboot-printenv-600x471.png\" alt=\"\" width=\"600\" height=\"471\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uboot-printenv-600x471.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uboot-printenv-300x235.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/uboot-printenv.png 747w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>We kept navigating the menus looking for interesting things to do, but the U-Boot environment was pretty limited. We also discovered that if you let the boot process take place normally and press any key once it is done, you are dumped at a command prompt as well.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24570\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/attachment\/normal_boot_cmd_prompt\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/normal_boot_cmd_prompt.png\" data-orig-size=\"751,579\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"normal_boot_cmd_prompt\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/normal_boot_cmd_prompt-300x231.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/normal_boot_cmd_prompt-600x463.png\" class=\"size-large wp-image-24570 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/normal_boot_cmd_prompt-600x463.png\" alt=\"\" width=\"600\" height=\"463\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/normal_boot_cmd_prompt-600x463.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/normal_boot_cmd_prompt-300x231.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/normal_boot_cmd_prompt.png 751w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Navigating to the available directories revealed a set of folders: cfg, net, and os. These folders contain files. They are not subdirectories. They don\u2019t have an extension. When invoked individually with no switches, they show a Usage description.<\/p>\n<h3>What we learned so far<\/h3>\n<p>So what have we learned about the security of this device? Someone with local access could probably modify its behavior quite easily.<\/p>\n<p>The documentation on the chipset mentions that the \u201c[REDACTED] embedded with 8MB memory and provide eCos turnkey for compact router\u2026\u201d<\/p>\n<p>We have a sneaky suspicion that this is the underlying operating system. We know that the\u00a0<a href=\"https:\/\/www.linux-mips.org\/wiki\/U-Boot\" target=\"_blank\" rel=\"noopener\">U-Boot for MIPS<\/a>\u00a0boot loader turns control over to \u201csomething\u201d once it\u2019s done initializing the hardware. Turnkey sounds easy, and easy is usually what manufacturers go for.<\/p>\n<p>The\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/ECos\" target=\"_blank\" rel=\"noopener\">wiki for eCos<\/a>\u00a0has interesting entries under the &#8220;Criticism&#8221; heading:<\/p>\n<p><em>The\u00a0FreeBSD\u00a0TCP\/IP network stack included with eCos is out of date (circa 2001) and exposes systems to numerous security and stability vulnerabilities (FreeBSD RELENG 4 4 0 RELEASE for IPv4 and FreeBSD\u2019s origin\u00a0KAME\u00a0for IPv6). Official eCos maintainers do not appear to monitor FreeBSD or KAME for security or stability updates, but rather rely on minimal and insufficient bug reports from users of eCos.<\/em><em><sup>[citation needed]<\/sup><\/em><\/p>\n<p><em>The\u00a0SNMP\u00a0package is rudimentary at best, once again, apparently due to its age.<\/em><em><sup>[original research?]<\/sup><\/em><\/p>\n<h3>Retrospection<\/h3>\n<p>Let\u2019s look at what it has taken so far to gather this information. Some specialized tools, some specialized hardware, some non-trivial computer knowledge, and a certain amount of pig-headedness. And after all this, we haven\u2019t even found anything remotely close to a glaring vulnerability. We know more about our device, and that\u2019s a good thing. However, there\u2019s no way that an average user will go through this. It\u2019s a cool exercise. But it isn\u2019t realistic to expect average users to reverse their devices.<\/p>\n<h3>What next?<\/h3>\n<p>We want to confirm what the OS is 100 percent and not just rely on a \u201chunch.\u201d Remember the firmware update we collected from the [REDACTED] website? We\u2019ll try to extract information from the .img file. We are hoping that the update will contain information that is useful. We\u2019re also interested in dumping the local firmware off of the router as well. We&#8217;re doing this so we can compare the original firmware with the modified, updated one, as well as to see what was corrected or changed and maybe figure out what was the issue that this update addressed.<\/p>\n<p>Maybe they implemented a fix that only partially fixes the issue? Maybe they fixed the problem and not the underlying vulnerability? All of these questions are worthy of an answer.<\/p>\n<p>Do you see something I\u2019ve done wrong? Have suggestions on other things to try? Reach out to @jean_taggart on the Twitters. I\u2019m keenly interested to hear from all of you.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/\">Assessing the security of a portable router: a look inside its hardware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jean Taggart| Date: Mon, 10 Sep 2018 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/' title='Assessing the security of a portable router: a look inside its hardware'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/shutterstock_314580008.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>In this post, we acquire the necessary equipment to analyze the security of an inexpensive portable router, which we access through its diagnostic interface, and poke around inside.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/technology\/\" rel=\"category tag\">Technology<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/com-cable-adapter-module\/\" rel=\"tag\">COM Cable Adapter Module<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybersecurity\/\" rel=\"tag\">cybersecurity<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/end-of-life\/\" rel=\"tag\">End Of Life<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eol\/\" rel=\"tag\">EOL<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/firmware\/\" rel=\"tag\">firmware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gnd\/\" rel=\"tag\">GND<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hardware\/\" rel=\"tag\">hardware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pl-2303hxa\/\" rel=\"tag\">PL-2303HXA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pl-2303x\/\" rel=\"tag\">PL-2303X<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/portable-router\/\" rel=\"tag\">portable router<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/px\/\" rel=\"tag\">Px<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/router\/\" rel=\"tag\">router<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rs232\/\" rel=\"tag\">RS232<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tx\/\" rel=\"tag\">Tx<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/u-boot\/\" rel=\"tag\">U-boot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/uart-pins\/\" rel=\"tag\">UART pins<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/usb\/\" rel=\"tag\">USB<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vcc\/\" rel=\"tag\">VCC<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wifi\/\" rel=\"tag\">wifi<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/' title='Assessing the security of a portable router: a look inside its hardware'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/\">Assessing the security of a portable router: a look inside its hardware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[19436,4500,19437,19438,11617,19439,17081,19440,19441,19442,19443,18732,19444,1331,19445,19446,19447,19448,19449,6273],"class_list":["post-13325","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-com-cable-adapter-module","tag-cybersecurity","tag-end-of-life","tag-eol","tag-firmware","tag-gnd","tag-hardware","tag-pl-2303hxa","tag-pl-2303x","tag-portable-router","tag-px","tag-router","tag-rs232","tag-technology","tag-tx","tag-u-boot","tag-uart-pins","tag-usb","tag-vcc","tag-wifi"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13325"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13325\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13325"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}