Possible Backdoor Found in Chinese-Made Routers

A Netis 300-Mbps wireless-N router. Credit: Netis

(Image credit: A Netis 300-Mbps wireless-N router. Credit: Netis)

Wireless routers from Chinese networking-equipment manufacturer Netcore may contain a backdoor, security experts say. If true, then criminals or spies could take over the routers, infect them with malware or dismantle the routers' security settings.

Over 2 million vulnerable devices appear to be currently in use, said Tokyo-based security company Trend Micro in a blog posting earlier this week. Most of the routers are in China, but others are located in South Korea, Taiwan, Israel and the United States, where they're sold under the brand name Netis.

The Netcore and Netis lines include both residential and enterprise routers. If Netcore does not patch the vulnerability, Trend Micro says, owners' safest option might be to simply buy a new router.

MORE: Your Router's Security Stinks: Here's How to Fix It

"Backdoor" is a shorthand term for a hidden access method that bypasses normal security in computer hardware or software. For example, your laptop might have an administrator password that only you know, but the laptop's manufacturer may have built in a backdoor that lets tech-support personnel access the machine without the admin password — helpful if you forget the password or need help fixing your computer.

But there are backdoors, and then there are backdoors. If the one on your laptop can be compared to a sturdy, locked door, then the one on Netcore routers may be a screen door that flaps open in the breeze.

The Netcore backdoor can be accessed from anywhere on the Internet so long as the router has an externally accessible IP address — and most routers that handle Internet traffic would. (Specifically, the backdoor is an open UDP port listening at port 53413.)

Trend Micro said it contacted Netcore's headquarters in Shenzhen, China, but did not receive a response. Fear that Chinese networking equipment may contain backdoors has led several Western countries to bar certain Chinese companies from government contracts.

It would be easy for attackers to do a scan for IP addresses with that port open to the UDP protocol, which is exactly what Trend Micro did to estimate how many of Netcore and Netis routers may be in use. (Apple uses port 53413 for storage-system software, but it listens for the different TCP protocol.) If attackers knew the specific IP address of a Netcore router they wanted to access, it would all the better to hack you with.

You can check to see whether your router has port 53143 open by using Gibson Research Corporation's free Shields Up online port scanner.

The password to gain administrative access to a router using this port is written into each Netis/Netcore device's firmware — it can't be changed. Every single Netis/Netcore router, Trend Micro said, has the same password for the backdoor.

If attackers get the password and access the router's external IP address, they'll be able to log into the router as well as upload and run files to it. The attackers could also change the DNS settings, redirecting users to malicious websites, or conduct man-in-the-middle attacks that secretly control both ends of a communication or transaction.

Only one Netis/Netcore router appears to support open-source router firmware like dd-wrt or Tomato, Trend Micro said without naming the model.

"Users have relatively few solutions available to remedy this issue," Trend Micro said. "Aside from [replacing the firmware], the only adequate alternative would be to replace these devices."

Jill Scharr is a staff writer for Tom's Guide, where she regularly covers security, 3D printing and video games. You can follow Jill on Twitter @JillScharr and on Google+. Follow us @tomsguide, on Facebook and on Google+.

TOPICS

Jill Scharr is a creative writer and narrative designer in the videogame industry. She's currently Project Lead Writer at the games studio Harebrained Schemes, and has also worked at Bungie. Prior to that she worked as a Staff Writer for Tom's Guide, covering video games, online security, 3D printing and tech innovation among many subjects. 

Latest in Routers
The eero Pro 7 next to the eero Max 7 on a desk
Eero Pro 7 vs Eero Max 7: Which Wi-Fi 7-powered eero mesh system should you buy?
Eero Pro 7 sitting on counter
Eero Pro 7 review: Fast Wi-Fi 7 mesh speeds simplified
Netgear Orbi 873 on desk
Netgear Orbi 870 review: A great Wi-Fi 7 mesh kit for long range performance
TP-Link's Deco BE65-Outdoor Wi-Fi 7 mesh node mounted to a pole at CES 2025
TP-Link’s new outdoor mesh extender will give you true Wi-Fi 7 speeds right in your backyard
The MSI Roammii BE Lite dual-band mesh Wi-Fi 7 router on a table
Upgrading to Wi-Fi 7 is about to get more complicated — and these new routers are to blame
TP- Link Archer AX55 sitting on desk
This Chinese router company with 65% market share in the US could be banned — what you need to know
Latest in News
Nintendo Switch 2
Nintendo Switch 2 rumored specs — here’s what we know so far
iPhone 17 Pro render
iPhone 17 Pro — 7 biggest rumored upgrades
CAD renderings of the Google Pixel 10 Pro XL
Pixel 10 leak could be good news for all Android phones
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
Lewis Hamilton of Great Britain and Scuderia Ferrari looks on during Sprint Qualifying ahead of the F1 Grand Prix of China at Shanghai International Circuit in Shanghai, China, on March 21, 2025. (Photo by Song Haiyuan/Paddocker/NurPhoto via Getty Images)
How to watch Chinese Grand Prix 2025 online – stream F1 without cable, qualifying highlights
NYTimes Connections
NYT Connections today hints and answers — Saturday, March 22 (#650)
  • kissmye
    dd-wrt supported: NETCORE NW618 PB20
    Reply
  • axefire0
    This backdoor is obviously intentional and pre-meditated through the instructions of the Chinese Communist Party (CCP).
    Reply