Main Forum > General Computer Support

Ping default gateway resulted in request timed out 100% loss

<< < (6/9) > >>

Boggin:
If Port 80 is now stealthed, then I wouldn't bother with that.

It's interesting that there is now a firmware update for the router - perhaps that is in response to your query.

What is the error message ?

jraju:
Avast would not allow to the site teracom.in, as a redirect hack site.
I have uninstalled Panda and started using avast again. The error message is the 404 error. the page opens but no content. It says that it may have been removed.
                        I think the co. left the site with deleting the firmware updates

jraju:
Hi, Boggins
                Please see the attached . The rom jraju1451954 problem resolved.
                I  tried all sort of things like selecting SPI enabled , giving password tight etc. But still avast found rom O vulnerability again and again.
                Just went to this author, Shane, other site pcwintech and downloaded the simple port forwarding tool . It captured my router, but not in my vendor name. I just first tried to forward port 80 to unused ip port in my computer. Still the problem continued.
                 I again  enabled  spi and checked with grc.com
                  still the problem existed.
                Coming to the point. I tried to locate the weak port 7457 which is said to inject vulnerability to rom 0. I will enclose the details of the injection in next post if possible. It is a lengthy article, which described about this vulnerability and how any program could easily change it.
                    I tried again at the grc.com, it shows all the port stealthy, but still i got this rom 0.
                       I then opened Shane tool and then took the risk of just updating the router, it suddenly started downloading the updates from somewhere and i saved it.
                     In the interval, i tried any internet block yellow. Nothing happened. Then the sweet surprise.
I checked again in avast and bingo, the vulnerability gone.
                 To shane:
                             What a wonderful free program that you give. Eventhough my router name was not in the list, it shows the router as something and picture as something. But anyhow, taking the risk,of updating router, no file available elsewhere, from your database or source, i was updated within seconds. How it is possible to have this cure. My vendor is teracom, and the avast shows it as Mediatek. Is the firmware suited my modem, or the modem firmware was captured by your program.
       In these days of router hack, your tool is a blessing in disguise. Thank you , shane

Samson:
J. Good news that you are sorted. You can double check Avast's new findings here http://rom-0.cz/

But, Shane's program does n't update the router firmware. When you click "Update Router" it is saving the port forward settings that you have made in the program to the router itself.

From the look of it your Teracom router is probably a rebranded/ licensed product that shares firmware with the Mediatek.

Hopefully you will be free from problems now that you have negated the rom-0 vulnerability, and your router settings should stick without getting changed.

Nice job  :smiley:

jraju:
you are correct it. The happiness is some what diminished as another scan, reproduces the same effect.
Samson, I just added port 80 and set the start and end port as such, and then direct to some other ip , i am not using.
                  But avast again came up with the error.
                  But after , router update, i do not know, i thought that the problem sorted out itself.
 My port settings are already as it is. Ok. it downloaded port settings, but avast one time found it safe and in the other round as vulnerability. Do you have any idea?
                 Instead of throwing the router , i am trying to keep the present safe. How do i know, even present modem would have the same vulnerability, that could not be fixed that much easily.
                  If shane s program, just save the port settings, then how come this clean in first instance.  I do understand, when in offline the port 80 could not made the update at all. Ok. After downloading it, thro the tool, should i close the port 80. I already did that in SIP settings , which is now enabled to let any open port. It is really a puzzle .. I am in still in the mid of a puzzle game.
                     Avast gives ok, then gives Red signal in the next scan. Ok. i make you and boggin think re again
Update: i now zone alarm free firewall

Navigation

[0] Message Index

[#] Next page

[*] Previous page

Go to full version