Backdoor found in D-Link Routers

A clever researcher discovered a backdoor (cached) into some D-link routers:

This is performing a strcmp [string comparison] between the string pointer at offset 0xD0 inside the http_request_t structure and the string "xmlset_roodkcableoj28840ybtide"; if the strings match, the check_login function call is skipped and alpha_auth_check returns 1 (authentication OK).

A quick Google for the "xmlset_roodkcableoj28840ybtide" string turns up only a single Russian forum post from a few years ago, which notes that this is an "interesting line" inside the /bin/webs binary. I'd have to agree.

Read the string backwards!

"Joel in engineering to human resources, please. Joel in engineering."