NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
rabidh
Jan 22, 2015Aspirant
Accesses to port 8086 from china?
Hi, Recently I've been having some problems with my home broadband, and after looking at the router I discovered the following lines in the log (lots of times): 13:37:50, 22 Jan. IN: ACCEPT [57]...
rabidh
Jan 22, 2015Aspirant
Thanks!
RAIDiator 5.3.11 (It's actually an NV+ v2), although I only upgraded from v10 today.
How do I remove Photos II? In the Add-On Manager the 'Remove' button is grayed out. I did uncheck the box by the side of it though, and now 8086 doesn't seem to be accessible. Although it's not like I'd actually set up Photos II before.
Could this have caused any problems with remote access? The fact that many outside users (looks like 10 a day on average) had access to the HTTP server, and often had connections open for several minutes worries me - especially as it looks like 5.3.10 (whichj I was running for ages) had the Shellshock vulnerability. Is there any way to see if anyone did manage to do anything to the ReadyNAS?
I'm usually really careful (single SSH connection with no root login on a non-standard port), so it sucks that the ReadyNas just opened an HTTP server with the shellshock vulnerability to the world, without asking me. I didn't realise upnp was that scary - I guess I'll have to make sure it's off on the router now.
RAIDiator 5.3.11 (It's actually an NV+ v2), although I only upgraded from v10 today.
How do I remove Photos II? In the Add-On Manager the 'Remove' button is grayed out. I did uncheck the box by the side of it though, and now 8086 doesn't seem to be accessible. Although it's not like I'd actually set up Photos II before.
Could this have caused any problems with remote access? The fact that many outside users (looks like 10 a day on average) had access to the HTTP server, and often had connections open for several minutes worries me - especially as it looks like 5.3.10 (whichj I was running for ages) had the Shellshock vulnerability. Is there any way to see if anyone did manage to do anything to the ReadyNAS?
I'm usually really careful (single SSH connection with no root login on a non-standard port), so it sucks that the ReadyNas just opened an HTTP server with the shellshock vulnerability to the world, without asking me. I didn't realise upnp was that scary - I guess I'll have to make sure it's off on the router now.
Related Content
NETGEAR Academy
Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!