Port 20005 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
20005 |
tcp |
netusb |
MoSucker trojan (2010)
[CVE-2015-3036] KCodes NetUSB Linux kernel driver is vulnerable to a buffer overflow via the network over TCP port 20005 that may result in a denial of service or code execution. The KCodes NetUSB driver has been integrated into several routers and network products, including Netgear, TP-Link, Trendnet, etc. An unauthenticated attacker on the local network (and a remote attacker with the default configuration on some devices) can trigger a buffer overflow that may result in a denial of service, or code execution. The vulnerability is triggered by simply specifying a machine name longer than 64 characters.
Certain D-Link, Edimax, NETGEAR, TP-Link, Tenda, and Western Digital devices are affected by an integer overflow by an unauthenticated attacker. Remote code execution from the WAN interface (TCP port 20005) cannot be ruled out; however, exploitability was judged to be of "rather significant complexity" but not "impossible." The overflow is in SoftwareBus_dispatchNormalEPMsgOut in the KCodes NetUSB kernel module. Affected NETGEAR devices are D7800 before 1.0.1.68, R6400v2 before 1.0.4.122, and R6700v3 before 1.0.4.122.
References: [CVE-2021-45608] |
SG
|
20005 |
tcp |
trojan |
[trojan] MoSucker |
Trojans
|
20005 |
tcp |
btx |
xcept4 (Interacts with German Telekom's CEPT videotext service) |
SANS
|
20005 |
tcp |
Mosucker |
[trojan] Mosucker |
SANS
|
20005 |
tcp |
btx |
xcept4 (Interacts with German Telekom's CEPT videotext service) |
Nmap
|
20005 |
tcp,udp |
openwebnet |
OpenWebNet protocol for electric network, registered 2008-04-09 |
IANA
|
20000-20010 |
udp |
applications |
Cal Ripkens Real Baseball |
Portforward
|
20000-21000 |
udp |
applications |
Ground Control |
Portforward
|
20000-21000 |
udp |
applications |
Ground Control with Chat Rooms |
Portforward
|
20000-20019 |
tcp |
applications |
ICQ |
Portforward
|
|
10 records found
|