
SANS Internet StormCast
SANS Stormcast Wednesday, January 7th, 2026: Tailsnitch Review; D-Link DSL EoL Vuln; TOTOLINK Unpatched Vuln
Key Takeaways
- •Tailsnitch audits Tailscale configs, highlights outdated versions
- •Tool offers detection mode, optional risky auto‑fix
- •Severity ratings stay realistic, avoiding overhyped alerts
- •Legacy DSL modems vulnerable to unauthenticated DNS script injection
- •TOTOLINK EX200 firmware bug spawns unauthenticated Telnet server
Pulse Analysis
Johannes Ulrich’s latest Stormcast episode spotlights Tailsnitch, an open‑source Go binary designed to audit Tailscale VPN configurations. The tool scans for common missteps such as outdated client versions, improperly set auto‑updates, and non‑expiring access tokens, then assigns severity levels that remain grounded in real risk. Listeners learn that Tailsnitch can run in a read‑only detection mode or invoke an automatic fix—though the latter is cautioned for larger networks. By surfacing these issues early, administrators can tighten zero‑trust boundaries and keep their Tailscale mesh both performant and secure.
The show then shifts to legacy DSL modems that have been out of support since 2013. A newly disclosed code‑execution flaw resides in the dnscfg.cgi script, allowing unauthenticated attackers to inject OS commands and hijack DNS settings. Because the devices are effectively abandoned, patches are unavailable, forcing organizations to replace the hardware or, where feasible, flash community‑maintained firmware such as OpenWRT. Ulrich emphasizes that lingering legacy equipment represents a silent attack surface, especially when it continues to serve critical broadband connections.
Finally, Ulrich examines the TOTOLINK EX200 extender, which suffers from a firmware‑update bug that can inadvertently launch an unauthenticated Telnet service. The behavior appears to be a fail‑safe intended for manual recovery, but it opens a backdoor that can be exploited with a simple port scan. No official patch exists, and the last firmware release dates back to 2023, effectively marking the product as end‑of‑life. Security teams are urged to inventory such devices, disable stray Telnet ports, and consider replacement to eliminate this lingering vulnerability.
Episode Description
Tool Review: Tailsnitch
https://isc.sans.edu/diary/Tool%20Review%3A%20Tailsnitch/32602
https://www.vulncheck.com/advisories/dlink-dsl-command-injection-via-dns-configuration-endpoint
https://kb.cert.org/vuls/id/295169
Comments
Want to join the conversation?
Loading comments...