Port 4321 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
4321 |
tcp |
trojans |
BoBo, Schoolbus 1.0 trojans
Command & Conquer: Red Alert 3 also uses this port.
WRPCServer.exe in WinSoftMagic WinRemotePC (WRPC) Lite 2008 and Full 2008 allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet to TCP port 4321.
References: [CVE-2008-3269], [BID-30236]
Technicolor DPC3928AD DOCSIS devices allow remote attackers to read arbitrary files via a request starting with "GET /../" on TCP port 4321.
References: [CVE-2017-11502]
Remote Who Is (TCP/UDP) [RFC 2167] (IANA official)
|
SG
|
4321 |
tcp |
trojan |
[trojan] BoBo |
Trojans
|
4321 |
tcp |
BoBo |
[trojan] BoBo |
SANS
|
4321,27900 |
udp |
applications |
Command and Conquer Generals |
Portforward
|
4321,27900 |
udp |
applications |
Command and Conquer Generals GameSpy |
Portforward
|
80, 3783, 4321, 6660-6669, 28900, 29900, 2901 |
tcp |
applications |
Command and Conquer Red Alert 3 |
Portforward
|
4321,27900 |
udp |
applications |
Command and Conquer Zero Hour |
Portforward
|
4321,27900 |
udp |
applications |
Command and Conquer Zero Hour GameSpy |
Portforward
|
4321 |
tcp,udp |
rwhois |
Remote Who Is [RFC2167] |
IANA
|
|
9 records found
Related ports: 3783
|